Feb 12 19:40:44.024630 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:40:44.024653 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:40:44.024664 kernel: BIOS-provided physical RAM map: Feb 12 19:40:44.024671 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:40:44.024676 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 12 19:40:44.024681 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 12 19:40:44.024692 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 12 19:40:44.024699 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 12 19:40:44.024705 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 12 19:40:44.024711 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 12 19:40:44.024718 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 12 19:40:44.024725 kernel: printk: bootconsole [earlyser0] enabled Feb 12 19:40:44.024731 kernel: NX (Execute Disable) protection: active Feb 12 19:40:44.024737 kernel: efi: EFI v2.70 by Microsoft Feb 12 19:40:44.024749 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 12 19:40:44.024756 kernel: random: crng init done Feb 12 19:40:44.024763 kernel: SMBIOS 3.1.0 present. Feb 12 19:40:44.024772 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:40:44.024778 kernel: Hypervisor detected: Microsoft Hyper-V Feb 12 19:40:44.024784 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 12 19:40:44.024790 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 12 19:40:44.024796 kernel: Hyper-V: Nested features: 0x1e0101 Feb 12 19:40:44.024804 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 12 19:40:44.024810 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 12 19:40:44.024820 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 12 19:40:44.024826 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 12 19:40:44.024834 kernel: tsc: Detected 2593.906 MHz processor Feb 12 19:40:44.024843 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:40:44.024850 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:40:44.024859 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 12 19:40:44.024866 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:40:44.024875 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 12 19:40:44.024884 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 12 19:40:44.024891 kernel: Using GB pages for direct mapping Feb 12 19:40:44.024901 kernel: Secure boot disabled Feb 12 19:40:44.024907 kernel: ACPI: Early table checksum verification disabled Feb 12 19:40:44.024913 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 12 19:40:44.024922 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024930 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024936 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:40:44.024950 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 12 19:40:44.024957 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024966 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024974 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024981 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.024991 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.025000 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.025007 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:40:44.025017 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 12 19:40:44.025023 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 12 19:40:44.025030 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 12 19:40:44.025040 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 12 19:40:44.025047 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 12 19:40:44.025054 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 12 19:40:44.025066 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 12 19:40:44.025073 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 12 19:40:44.025082 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 12 19:40:44.025090 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 12 19:40:44.025097 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:40:44.025107 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:40:44.025114 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 12 19:40:44.025121 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 12 19:40:44.025131 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 12 19:40:44.025139 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 12 19:40:44.025147 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 12 19:40:44.025156 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 12 19:40:44.025163 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 12 19:40:44.025171 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 12 19:40:44.025180 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 12 19:40:44.025186 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 12 19:40:44.025195 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 12 19:40:44.025203 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 12 19:40:44.025212 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 12 19:40:44.025222 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 12 19:40:44.025229 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 12 19:40:44.025236 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 12 19:40:44.031277 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 12 19:40:44.031287 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 12 19:40:44.031296 kernel: Zone ranges: Feb 12 19:40:44.031305 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:40:44.031314 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 19:40:44.031325 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:40:44.031332 kernel: Movable zone start for each node Feb 12 19:40:44.031342 kernel: Early memory node ranges Feb 12 19:40:44.031349 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:40:44.031359 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 12 19:40:44.031366 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 12 19:40:44.031374 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:40:44.031383 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 12 19:40:44.031391 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:40:44.031401 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:40:44.031408 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 12 19:40:44.031418 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 12 19:40:44.031425 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 12 19:40:44.031435 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:40:44.031442 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:40:44.031449 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:40:44.031459 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 12 19:40:44.031466 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:40:44.031478 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 12 19:40:44.031485 kernel: Booting paravirtualized kernel on Hyper-V Feb 12 19:40:44.031494 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:40:44.031502 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:40:44.031511 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:40:44.031519 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:40:44.031526 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:40:44.031535 kernel: Hyper-V: PV spinlocks enabled Feb 12 19:40:44.031542 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:40:44.031554 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 12 19:40:44.031561 kernel: Policy zone: Normal Feb 12 19:40:44.031570 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:40:44.031580 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:40:44.031588 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 19:40:44.031597 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:40:44.031603 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:40:44.031612 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 12 19:40:44.031622 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:40:44.031633 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:40:44.031647 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:40:44.031658 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:40:44.031666 kernel: rcu: RCU event tracing is enabled. Feb 12 19:40:44.031674 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:40:44.031684 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:40:44.031691 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:40:44.031701 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:40:44.031709 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:40:44.031719 kernel: Using NULL legacy PIC Feb 12 19:40:44.031730 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 12 19:40:44.031739 kernel: Console: colour dummy device 80x25 Feb 12 19:40:44.031749 kernel: printk: console [tty1] enabled Feb 12 19:40:44.031757 kernel: printk: console [ttyS0] enabled Feb 12 19:40:44.031764 kernel: printk: bootconsole [earlyser0] disabled Feb 12 19:40:44.031776 kernel: ACPI: Core revision 20210730 Feb 12 19:40:44.031784 kernel: Failed to register legacy timer interrupt Feb 12 19:40:44.031795 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:40:44.031802 kernel: Hyper-V: Using IPI hypercalls Feb 12 19:40:44.031809 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Feb 12 19:40:44.031820 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 19:40:44.031828 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 19:40:44.031838 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:40:44.031845 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:40:44.031854 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:40:44.031864 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:40:44.031875 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 19:40:44.031882 kernel: RETBleed: Vulnerable Feb 12 19:40:44.031890 kernel: Speculative Store Bypass: Vulnerable Feb 12 19:40:44.031900 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:40:44.031908 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:40:44.031917 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 19:40:44.031924 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:40:44.031934 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:40:44.031942 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:40:44.031954 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 19:40:44.031962 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 19:40:44.031970 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 19:40:44.031979 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:40:44.031988 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 12 19:40:44.031997 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 12 19:40:44.032004 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 12 19:40:44.032013 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 12 19:40:44.032022 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:40:44.032031 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:40:44.032039 kernel: LSM: Security Framework initializing Feb 12 19:40:44.032046 kernel: SELinux: Initializing. Feb 12 19:40:44.032058 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:40:44.032066 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:40:44.032076 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 19:40:44.032084 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 19:40:44.032092 kernel: signal: max sigframe size: 3632 Feb 12 19:40:44.032101 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:40:44.032111 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:40:44.032119 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:40:44.032126 kernel: x86: Booting SMP configuration: Feb 12 19:40:44.032137 kernel: .... node #0, CPUs: #1 Feb 12 19:40:44.032147 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 12 19:40:44.032157 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 19:40:44.032164 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:40:44.032171 kernel: smpboot: Max logical packages: 1 Feb 12 19:40:44.032180 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 12 19:40:44.032190 kernel: devtmpfs: initialized Feb 12 19:40:44.032200 kernel: x86/mm: Memory block size: 128MB Feb 12 19:40:44.032207 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 12 19:40:44.032216 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:40:44.032227 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:40:44.032235 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:40:44.032250 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:40:44.032258 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:40:44.032268 kernel: audit: type=2000 audit(1707766843.023:1): state=initialized audit_enabled=0 res=1 Feb 12 19:40:44.032276 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:40:44.032286 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:40:44.032293 kernel: cpuidle: using governor menu Feb 12 19:40:44.032306 kernel: ACPI: bus type PCI registered Feb 12 19:40:44.032313 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:40:44.032323 kernel: dca service started, version 1.12.1 Feb 12 19:40:44.032331 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:40:44.032339 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:40:44.032348 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:40:44.032356 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:40:44.032365 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:40:44.032373 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:40:44.032384 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:40:44.032393 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:40:44.032400 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:40:44.032410 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:40:44.032418 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:40:44.032425 kernel: ACPI: Interpreter enabled Feb 12 19:40:44.032436 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:40:44.032443 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:40:44.032454 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:40:44.032463 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 12 19:40:44.032472 kernel: iommu: Default domain type: Translated Feb 12 19:40:44.032481 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:40:44.032490 kernel: vgaarb: loaded Feb 12 19:40:44.032499 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:40:44.032506 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:40:44.032517 kernel: PTP clock support registered Feb 12 19:40:44.032525 kernel: Registered efivars operations Feb 12 19:40:44.032535 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:40:44.032543 kernel: PCI: System does not support PCI Feb 12 19:40:44.032553 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 12 19:40:44.032562 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:40:44.032572 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:40:44.032580 kernel: pnp: PnP ACPI init Feb 12 19:40:44.032587 kernel: pnp: PnP ACPI: found 3 devices Feb 12 19:40:44.032596 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:40:44.032605 kernel: NET: Registered PF_INET protocol family Feb 12 19:40:44.032614 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:40:44.032624 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 19:40:44.032632 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:40:44.032642 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:40:44.032650 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 19:40:44.032660 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 19:40:44.032667 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:40:44.032677 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:40:44.032685 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:40:44.032696 kernel: NET: Registered PF_XDP protocol family Feb 12 19:40:44.032706 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:40:44.032714 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 19:40:44.032723 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 12 19:40:44.032732 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:40:44.032741 kernel: Initialise system trusted keyrings Feb 12 19:40:44.032748 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 19:40:44.032759 kernel: Key type asymmetric registered Feb 12 19:40:44.032766 kernel: Asymmetric key parser 'x509' registered Feb 12 19:40:44.032777 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:40:44.032786 kernel: io scheduler mq-deadline registered Feb 12 19:40:44.032795 kernel: io scheduler kyber registered Feb 12 19:40:44.032804 kernel: io scheduler bfq registered Feb 12 19:40:44.032813 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:40:44.032822 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:40:44.032829 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:40:44.032840 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 19:40:44.032848 kernel: i8042: PNP: No PS/2 controller found. Feb 12 19:40:44.032987 kernel: rtc_cmos 00:02: registered as rtc0 Feb 12 19:40:44.033079 kernel: rtc_cmos 00:02: setting system clock to 2024-02-12T19:40:43 UTC (1707766843) Feb 12 19:40:44.033159 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 12 19:40:44.033169 kernel: fail to initialize ptp_kvm Feb 12 19:40:44.033180 kernel: intel_pstate: CPU model not supported Feb 12 19:40:44.033187 kernel: efifb: probing for efifb Feb 12 19:40:44.033196 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:40:44.033205 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:40:44.033214 kernel: efifb: scrolling: redraw Feb 12 19:40:44.033225 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:40:44.033232 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:40:44.033250 kernel: fb0: EFI VGA frame buffer device Feb 12 19:40:44.033260 kernel: pstore: Registered efi as persistent store backend Feb 12 19:40:44.033267 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:40:44.033276 kernel: Segment Routing with IPv6 Feb 12 19:40:44.033285 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:40:44.033293 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:40:44.033303 kernel: Key type dns_resolver registered Feb 12 19:40:44.033312 kernel: IPI shorthand broadcast: enabled Feb 12 19:40:44.033323 kernel: sched_clock: Marking stable (755890700, 22432000)->(980248600, -201925900) Feb 12 19:40:44.033331 kernel: registered taskstats version 1 Feb 12 19:40:44.033341 kernel: Loading compiled-in X.509 certificates Feb 12 19:40:44.033348 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:40:44.033357 kernel: Key type .fscrypt registered Feb 12 19:40:44.033366 kernel: Key type fscrypt-provisioning registered Feb 12 19:40:44.033375 kernel: pstore: Using crash dump compression: deflate Feb 12 19:40:44.033385 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:40:44.033393 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:40:44.033403 kernel: ima: No architecture policies found Feb 12 19:40:44.033411 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:40:44.033421 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:40:44.033428 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:40:44.033437 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:40:44.033446 kernel: Run /init as init process Feb 12 19:40:44.033456 kernel: with arguments: Feb 12 19:40:44.033464 kernel: /init Feb 12 19:40:44.033473 kernel: with environment: Feb 12 19:40:44.033483 kernel: HOME=/ Feb 12 19:40:44.033491 kernel: TERM=linux Feb 12 19:40:44.033501 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:40:44.033510 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:40:44.033522 systemd[1]: Detected virtualization microsoft. Feb 12 19:40:44.033531 systemd[1]: Detected architecture x86-64. Feb 12 19:40:44.033542 systemd[1]: Running in initrd. Feb 12 19:40:44.033550 systemd[1]: No hostname configured, using default hostname. Feb 12 19:40:44.033561 systemd[1]: Hostname set to . Feb 12 19:40:44.033570 systemd[1]: Initializing machine ID from random generator. Feb 12 19:40:44.033581 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:40:44.033588 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:40:44.033598 systemd[1]: Reached target cryptsetup.target. Feb 12 19:40:44.033607 systemd[1]: Reached target paths.target. Feb 12 19:40:44.033617 systemd[1]: Reached target slices.target. Feb 12 19:40:44.033627 systemd[1]: Reached target swap.target. Feb 12 19:40:44.033636 systemd[1]: Reached target timers.target. Feb 12 19:40:44.033645 systemd[1]: Listening on iscsid.socket. Feb 12 19:40:44.033656 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:40:44.033664 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:40:44.033673 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:40:44.033683 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:40:44.033695 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:40:44.033703 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:40:44.033712 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:40:44.033722 systemd[1]: Reached target sockets.target. Feb 12 19:40:44.033732 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:40:44.033740 systemd[1]: Finished network-cleanup.service. Feb 12 19:40:44.033748 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:40:44.033759 systemd[1]: Starting systemd-journald.service... Feb 12 19:40:44.033767 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:40:44.033779 systemd[1]: Starting systemd-resolved.service... Feb 12 19:40:44.033787 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:40:44.033798 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:40:44.033806 kernel: audit: type=1130 audit(1707766844.028:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.033822 systemd-journald[183]: Journal started Feb 12 19:40:44.033867 systemd-journald[183]: Runtime Journal (/run/log/journal/3cc8f0be158d4a12b65700ff3e5ac173) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:40:44.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.012303 systemd-modules-load[184]: Inserted module 'overlay' Feb 12 19:40:44.047290 systemd[1]: Started systemd-journald.service. Feb 12 19:40:44.064253 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:40:44.062325 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:40:44.066498 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:40:44.072057 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:40:44.088368 kernel: audit: type=1130 audit(1707766844.061:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.088066 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:40:44.109992 kernel: Bridge firewalling registered Feb 12 19:40:44.100877 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:40:44.105773 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 12 19:40:44.112485 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:40:44.115601 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:40:44.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.138194 systemd-resolved[185]: Positive Trust Anchors: Feb 12 19:40:44.159260 kernel: audit: type=1130 audit(1707766844.066:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.159291 kernel: audit: type=1130 audit(1707766844.068:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.159349 dracut-cmdline[203]: dracut-dracut-053 Feb 12 19:40:44.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.158291 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:40:44.209491 kernel: audit: type=1130 audit(1707766844.105:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.209518 kernel: audit: type=1130 audit(1707766844.114:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.209545 kernel: SCSI subsystem initialized Feb 12 19:40:44.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.209609 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:40:44.158329 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:40:44.162253 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 12 19:40:44.162990 systemd[1]: Started systemd-resolved.service. Feb 12 19:40:44.244007 systemd[1]: Reached target nss-lookup.target. Feb 12 19:40:44.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.267259 kernel: audit: type=1130 audit(1707766844.243:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.284725 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:40:44.284769 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:40:44.289951 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:40:44.289977 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:40:44.297566 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 12 19:40:44.299262 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:40:44.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.305400 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:40:44.320988 kernel: audit: type=1130 audit(1707766844.304:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.329384 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:40:44.347432 kernel: iscsi: registered transport (tcp) Feb 12 19:40:44.347466 kernel: audit: type=1130 audit(1707766844.333:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.370827 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:40:44.370870 kernel: QLogic iSCSI HBA Driver Feb 12 19:40:44.400123 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:40:44.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.405817 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:40:44.456261 kernel: raid6: avx512x4 gen() 18503 MB/s Feb 12 19:40:44.476255 kernel: raid6: avx512x4 xor() 7869 MB/s Feb 12 19:40:44.496254 kernel: raid6: avx512x2 gen() 18313 MB/s Feb 12 19:40:44.516258 kernel: raid6: avx512x2 xor() 29945 MB/s Feb 12 19:40:44.539253 kernel: raid6: avx512x1 gen() 18177 MB/s Feb 12 19:40:44.559254 kernel: raid6: avx512x1 xor() 27285 MB/s Feb 12 19:40:44.579254 kernel: raid6: avx2x4 gen() 18307 MB/s Feb 12 19:40:44.599254 kernel: raid6: avx2x4 xor() 8080 MB/s Feb 12 19:40:44.619255 kernel: raid6: avx2x2 gen() 18345 MB/s Feb 12 19:40:44.639255 kernel: raid6: avx2x2 xor() 22383 MB/s Feb 12 19:40:44.659252 kernel: raid6: avx2x1 gen() 13855 MB/s Feb 12 19:40:44.679256 kernel: raid6: avx2x1 xor() 19538 MB/s Feb 12 19:40:44.699252 kernel: raid6: sse2x4 gen() 11765 MB/s Feb 12 19:40:44.719250 kernel: raid6: sse2x4 xor() 7253 MB/s Feb 12 19:40:44.740256 kernel: raid6: sse2x2 gen() 12871 MB/s Feb 12 19:40:44.760253 kernel: raid6: sse2x2 xor() 7551 MB/s Feb 12 19:40:44.780253 kernel: raid6: sse2x1 gen() 11658 MB/s Feb 12 19:40:44.803856 kernel: raid6: sse2x1 xor() 5933 MB/s Feb 12 19:40:44.803888 kernel: raid6: using algorithm avx512x4 gen() 18503 MB/s Feb 12 19:40:44.803901 kernel: raid6: .... xor() 7869 MB/s, rmw enabled Feb 12 19:40:44.807285 kernel: raid6: using avx512x2 recovery algorithm Feb 12 19:40:44.826262 kernel: xor: automatically using best checksumming function avx Feb 12 19:40:44.921266 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:40:44.929731 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:40:44.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.933000 audit: BPF prog-id=7 op=LOAD Feb 12 19:40:44.933000 audit: BPF prog-id=8 op=LOAD Feb 12 19:40:44.934358 systemd[1]: Starting systemd-udevd.service... Feb 12 19:40:44.949180 systemd-udevd[386]: Using default interface naming scheme 'v252'. Feb 12 19:40:44.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.953856 systemd[1]: Started systemd-udevd.service. Feb 12 19:40:44.957237 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:40:44.974808 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation Feb 12 19:40:45.002819 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:40:45.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:45.007975 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:40:45.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:45.042676 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:40:45.086261 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:40:45.126811 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:40:45.126873 kernel: AES CTR mode by8 optimization enabled Feb 12 19:40:45.126891 kernel: hv_vmbus: Vmbus version:5.2 Feb 12 19:40:45.148526 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:40:45.148586 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:40:45.160422 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:40:45.160471 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 12 19:40:45.160485 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:40:45.176261 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 12 19:40:45.176302 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:40:45.185263 kernel: scsi host0: storvsc_host_t Feb 12 19:40:45.191256 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:40:45.191311 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:40:45.196928 kernel: scsi host1: storvsc_host_t Feb 12 19:40:45.196981 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:40:45.224046 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:40:45.224346 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:40:45.231257 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:40:45.243800 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:40:45.244018 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:40:45.244141 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:40:45.248257 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:40:45.248427 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:40:45.259266 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:40:45.264257 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:40:45.356128 kernel: hv_netvsc 000d3ab4-c147-000d-3ab4-c147000d3ab4 eth0: VF slot 1 added Feb 12 19:40:45.365347 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:40:45.372258 kernel: hv_pci b7c55970-4403-46e3-8966-df55c451178e: PCI VMBus probing: Using version 0x10004 Feb 12 19:40:45.383745 kernel: hv_pci b7c55970-4403-46e3-8966-df55c451178e: PCI host bridge to bus 4403:00 Feb 12 19:40:45.383894 kernel: pci_bus 4403:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 12 19:40:45.384026 kernel: pci_bus 4403:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:40:45.393435 kernel: pci 4403:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 12 19:40:45.403199 kernel: pci 4403:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:40:45.420286 kernel: pci 4403:00:02.0: enabling Extended Tags Feb 12 19:40:45.434312 kernel: pci 4403:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 4403:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 12 19:40:45.443181 kernel: pci_bus 4403:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:40:45.443346 kernel: pci 4403:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:40:45.536264 kernel: mlx5_core 4403:00:02.0: firmware version: 14.30.1350 Feb 12 19:40:45.672693 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:40:45.700265 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (438) Feb 12 19:40:45.706258 kernel: mlx5_core 4403:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 19:40:45.715040 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:40:45.860733 kernel: mlx5_core 4403:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 12 19:40:45.860978 kernel: mlx5_core 4403:00:02.0: mlx5e_tc_post_act_init:40:(pid 7): firmware level support is missing Feb 12 19:40:45.861444 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:40:45.883127 kernel: hv_netvsc 000d3ab4-c147-000d-3ab4-c147000d3ab4 eth0: VF registering: eth1 Feb 12 19:40:45.883324 kernel: mlx5_core 4403:00:02.0 eth1: joined to eth0 Feb 12 19:40:45.892671 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:40:45.901421 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:40:45.908410 kernel: mlx5_core 4403:00:02.0 enP17411s1: renamed from eth1 Feb 12 19:40:45.909199 systemd[1]: Starting disk-uuid.service... Feb 12 19:40:45.924256 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:40:45.932253 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:40:45.939265 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:40:46.935270 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:40:46.936086 disk-uuid[561]: The operation has completed successfully. Feb 12 19:40:47.010260 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:40:47.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.010377 systemd[1]: Finished disk-uuid.service. Feb 12 19:40:47.018203 systemd[1]: Starting verity-setup.service... Feb 12 19:40:47.066258 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:40:47.299052 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:40:47.305433 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:40:47.309488 systemd[1]: Finished verity-setup.service. Feb 12 19:40:47.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.383052 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:40:47.386889 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:40:47.386994 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:40:47.391280 systemd[1]: Starting ignition-setup.service... Feb 12 19:40:47.395787 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:40:47.412643 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:40:47.412678 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:40:47.412691 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:40:47.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.466000 audit: BPF prog-id=9 op=LOAD Feb 12 19:40:47.463799 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:40:47.470102 systemd[1]: Starting systemd-networkd.service... Feb 12 19:40:47.483043 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:40:47.498733 systemd-networkd[828]: lo: Link UP Feb 12 19:40:47.498744 systemd-networkd[828]: lo: Gained carrier Feb 12 19:40:47.501550 systemd-networkd[828]: Enumeration completed Feb 12 19:40:47.502049 systemd[1]: Started systemd-networkd.service. Feb 12 19:40:47.504073 systemd-networkd[828]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:40:47.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.512340 systemd[1]: Reached target network.target. Feb 12 19:40:47.516099 systemd[1]: Starting iscsiuio.service... Feb 12 19:40:47.523906 systemd[1]: Started iscsiuio.service. Feb 12 19:40:47.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.528486 systemd[1]: Starting iscsid.service... Feb 12 19:40:47.532050 iscsid[837]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:40:47.532050 iscsid[837]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:40:47.532050 iscsid[837]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:40:47.532050 iscsid[837]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:40:47.532050 iscsid[837]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:40:47.532050 iscsid[837]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:40:47.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.533393 systemd[1]: Started iscsid.service. Feb 12 19:40:47.538266 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:40:47.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.564167 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:40:47.570007 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:40:47.576088 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:40:47.580513 systemd[1]: Reached target remote-fs.target. Feb 12 19:40:47.596762 kernel: mlx5_core 4403:00:02.0 enP17411s1: Link up Feb 12 19:40:47.585069 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:40:47.600905 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:40:47.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.664264 kernel: hv_netvsc 000d3ab4-c147-000d-3ab4-c147000d3ab4 eth0: Data path switched to VF: enP17411s1 Feb 12 19:40:47.664507 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:40:47.669356 systemd-networkd[828]: enP17411s1: Link UP Feb 12 19:40:47.669737 systemd-networkd[828]: eth0: Link UP Feb 12 19:40:47.670212 systemd-networkd[828]: eth0: Gained carrier Feb 12 19:40:47.674583 systemd[1]: Finished ignition-setup.service. Feb 12 19:40:47.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.679670 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:40:47.681500 systemd-networkd[828]: enP17411s1: Gained carrier Feb 12 19:40:47.704310 systemd-networkd[828]: eth0: DHCPv4 address 10.200.8.36/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:40:49.503494 systemd-networkd[828]: eth0: Gained IPv6LL Feb 12 19:40:50.611066 ignition[852]: Ignition 2.14.0 Feb 12 19:40:50.611082 ignition[852]: Stage: fetch-offline Feb 12 19:40:50.611179 ignition[852]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:50.611229 ignition[852]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:50.695465 ignition[852]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:50.695711 ignition[852]: parsed url from cmdline: "" Feb 12 19:40:50.695715 ignition[852]: no config URL provided Feb 12 19:40:50.695721 ignition[852]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:40:50.722975 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 19:40:50.722997 kernel: audit: type=1130 audit(1707766850.703:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.699822 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:40:50.695733 ignition[852]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:40:50.704330 systemd[1]: Starting ignition-fetch.service... Feb 12 19:40:50.695739 ignition[852]: failed to fetch config: resource requires networking Feb 12 19:40:50.698835 ignition[852]: Ignition finished successfully Feb 12 19:40:50.712425 ignition[858]: Ignition 2.14.0 Feb 12 19:40:50.712430 ignition[858]: Stage: fetch Feb 12 19:40:50.712523 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:50.712553 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:50.715689 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:50.716337 ignition[858]: parsed url from cmdline: "" Feb 12 19:40:50.716343 ignition[858]: no config URL provided Feb 12 19:40:50.716350 ignition[858]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:40:50.716362 ignition[858]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:40:50.716414 ignition[858]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:40:50.747674 ignition[858]: GET result: OK Feb 12 19:40:50.756690 ignition[858]: config has been read from IMDS userdata Feb 12 19:40:50.758128 ignition[858]: parsing config with SHA512: 8aa7faccc24e1a8a0c756369ff571b933169cd4bea666bc33773d59c00109a0b80ab02c1968822ded41ccb04dde6cb1ba90238e0cb44af135399d77762402f02 Feb 12 19:40:50.790098 unknown[858]: fetched base config from "system" Feb 12 19:40:50.790114 unknown[858]: fetched base config from "system" Feb 12 19:40:50.790746 ignition[858]: fetch: fetch complete Feb 12 19:40:50.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.790121 unknown[858]: fetched user config from "azure" Feb 12 19:40:50.814897 kernel: audit: type=1130 audit(1707766850.798:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.790752 ignition[858]: fetch: fetch passed Feb 12 19:40:50.794579 systemd[1]: Finished ignition-fetch.service. Feb 12 19:40:50.790792 ignition[858]: Ignition finished successfully Feb 12 19:40:50.800218 systemd[1]: Starting ignition-kargs.service... Feb 12 19:40:50.818614 ignition[864]: Ignition 2.14.0 Feb 12 19:40:50.818621 ignition[864]: Stage: kargs Feb 12 19:40:50.818734 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:50.818758 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:50.829743 systemd[1]: Finished ignition-kargs.service. Feb 12 19:40:50.821593 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:50.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.825851 ignition[864]: kargs: kargs passed Feb 12 19:40:50.847710 kernel: audit: type=1130 audit(1707766850.833:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.825904 ignition[864]: Ignition finished successfully Feb 12 19:40:50.850339 systemd[1]: Starting ignition-disks.service... Feb 12 19:40:50.857608 ignition[870]: Ignition 2.14.0 Feb 12 19:40:50.857617 ignition[870]: Stage: disks Feb 12 19:40:50.857736 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:50.857759 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:50.863441 systemd[1]: Finished ignition-disks.service. Feb 12 19:40:50.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.860063 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:50.883302 kernel: audit: type=1130 audit(1707766850.866:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.866509 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:40:50.862795 ignition[870]: disks: disks passed Feb 12 19:40:50.883323 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:40:50.862837 ignition[870]: Ignition finished successfully Feb 12 19:40:50.887602 systemd[1]: Reached target local-fs.target. Feb 12 19:40:50.889681 systemd[1]: Reached target sysinit.target. Feb 12 19:40:50.890546 systemd[1]: Reached target basic.target. Feb 12 19:40:50.894367 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:40:50.960789 systemd-fsck[878]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 12 19:40:50.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.968511 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:40:50.987328 kernel: audit: type=1130 audit(1707766850.970:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:50.984370 systemd[1]: Mounting sysroot.mount... Feb 12 19:40:51.009171 systemd[1]: Mounted sysroot.mount. Feb 12 19:40:51.015187 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:40:51.011502 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:40:51.041849 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:40:51.047780 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:40:51.052914 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:40:51.052955 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:40:51.062197 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:40:51.106281 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:40:51.110468 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:40:51.123263 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (889) Feb 12 19:40:51.131769 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:40:51.131800 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:40:51.131815 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:40:51.134127 initrd-setup-root[894]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:40:51.140009 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:40:51.165209 initrd-setup-root[920]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:40:51.170172 initrd-setup-root[928]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:40:51.174271 initrd-setup-root[936]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:40:51.622561 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:40:51.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.627756 systemd[1]: Starting ignition-mount.service... Feb 12 19:40:51.645670 kernel: audit: type=1130 audit(1707766851.626:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.642062 systemd[1]: Starting sysroot-boot.service... Feb 12 19:40:51.647010 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:40:51.647135 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:40:51.669333 ignition[955]: INFO : Ignition 2.14.0 Feb 12 19:40:51.669333 ignition[955]: INFO : Stage: mount Feb 12 19:40:51.669333 ignition[955]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:51.669333 ignition[955]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:51.702476 kernel: audit: type=1130 audit(1707766851.681:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.702516 kernel: audit: type=1130 audit(1707766851.702:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:51.702595 ignition[955]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:51.702595 ignition[955]: INFO : mount: mount passed Feb 12 19:40:51.702595 ignition[955]: INFO : Ignition finished successfully Feb 12 19:40:51.678150 systemd[1]: Finished sysroot-boot.service. Feb 12 19:40:51.696748 systemd[1]: Finished ignition-mount.service. Feb 12 19:40:52.406304 coreos-metadata[888]: Feb 12 19:40:52.406 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:40:52.435754 coreos-metadata[888]: Feb 12 19:40:52.435 INFO Fetch successful Feb 12 19:40:52.472136 coreos-metadata[888]: Feb 12 19:40:52.472 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:40:52.491078 coreos-metadata[888]: Feb 12 19:40:52.490 INFO Fetch successful Feb 12 19:40:52.521118 coreos-metadata[888]: Feb 12 19:40:52.521 INFO wrote hostname ci-3510.3.2-a-3bedefc55b to /sysroot/etc/hostname Feb 12 19:40:52.527389 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:40:52.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.533135 systemd[1]: Starting ignition-files.service... Feb 12 19:40:52.545931 kernel: audit: type=1130 audit(1707766852.532:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.551768 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:40:52.563258 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (968) Feb 12 19:40:52.563292 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:40:52.571522 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:40:52.571546 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:40:52.579172 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:40:52.593411 ignition[987]: INFO : Ignition 2.14.0 Feb 12 19:40:52.593411 ignition[987]: INFO : Stage: files Feb 12 19:40:52.597414 ignition[987]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:40:52.597414 ignition[987]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:40:52.610337 ignition[987]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:40:52.629024 ignition[987]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:40:52.643109 ignition[987]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:40:52.643109 ignition[987]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:40:52.683836 ignition[987]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:40:52.688582 ignition[987]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:40:52.688582 ignition[987]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:40:52.688582 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:40:52.688582 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:40:52.684630 unknown[987]: wrote ssh authorized keys file for user: core Feb 12 19:40:53.327222 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:40:53.477914 ignition[987]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:40:53.486871 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:40:53.486871 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:40:53.486871 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:40:53.855748 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:40:53.958642 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:40:53.963849 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:40:53.963849 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:40:54.468265 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:40:54.634343 ignition[987]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:40:54.642225 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:40:54.647084 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:40:54.651164 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:40:55.201127 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:41:18.372003 ignition[987]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 12 19:41:18.380535 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:41:18.380535 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:41:18.380535 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:41:19.156791 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:41:44.000134 ignition[987]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 19:41:44.009713 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:41:44.009713 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:41:44.009713 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:41:44.775273 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:42:38.892528 ignition[987]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 19:42:38.892528 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:42:38.905232 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:42:38.936267 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:42:38.936267 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:42:38.936267 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:42:38.936267 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:42:38.936267 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:42:38.964636 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (992) Feb 12 19:42:38.964664 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:42:38.964664 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:42:38.964664 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1160070320" Feb 12 19:42:38.964664 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1160070320": device or resource busy Feb 12 19:42:38.964664 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1160070320", trying btrfs: device or resource busy Feb 12 19:42:38.964664 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1160070320" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1160070320" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1160070320" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1160070320" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1306836841" Feb 12 19:42:38.999269 ignition[987]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1306836841": device or resource busy Feb 12 19:42:38.999269 ignition[987]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1306836841", trying btrfs: device or resource busy Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1306836841" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1306836841" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem1306836841" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem1306836841" Feb 12 19:42:38.999269 ignition[987]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:42:38.999269 ignition[987]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 12 19:42:38.999269 ignition[987]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 12 19:42:39.128299 kernel: audit: type=1130 audit(1707766958.999:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.128330 kernel: audit: type=1130 audit(1707766959.043:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.128347 kernel: audit: type=1131 audit(1707766959.043:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.128363 kernel: audit: type=1130 audit(1707766959.095:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:38.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:38.978104 systemd[1]: mnt-oem1160070320.mount: Deactivated successfully. Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(20): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(21): [started] setting preset to enabled for "waagent.service" Feb 12 19:42:39.130975 ignition[987]: INFO : files: op(21): [finished] setting preset to enabled for "waagent.service" Feb 12 19:42:39.243154 kernel: audit: type=1130 audit(1707766959.156:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.243191 kernel: audit: type=1131 audit(1707766959.156:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:38.989520 systemd[1]: mnt-oem1306836841.mount: Deactivated successfully. Feb 12 19:42:39.245851 ignition[987]: INFO : files: op(22): [started] setting preset to enabled for "nvidia.service" Feb 12 19:42:39.245851 ignition[987]: INFO : files: op(22): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:42:39.245851 ignition[987]: INFO : files: op(23): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:42:39.245851 ignition[987]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:42:39.245851 ignition[987]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:42:39.245851 ignition[987]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:42:39.245851 ignition[987]: INFO : files: files passed Feb 12 19:42:39.245851 ignition[987]: INFO : Ignition finished successfully Feb 12 19:42:38.995002 systemd[1]: Finished ignition-files.service. Feb 12 19:42:39.275317 initrd-setup-root-after-ignition[1012]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:42:39.014144 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:42:39.029963 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:42:39.030718 systemd[1]: Starting ignition-quench.service... Feb 12 19:42:39.038977 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:42:39.039071 systemd[1]: Finished ignition-quench.service. Feb 12 19:42:39.089394 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:42:39.095811 systemd[1]: Reached target ignition-complete.target. Feb 12 19:42:39.134463 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:42:39.148843 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:42:39.148930 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:42:39.156180 systemd[1]: Reached target initrd-fs.target. Feb 12 19:42:39.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.173293 systemd[1]: Reached target initrd.target. Feb 12 19:42:39.326285 kernel: audit: type=1130 audit(1707766959.307:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.186166 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:42:39.187147 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:42:39.304626 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:42:39.308001 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:42:39.341402 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:42:39.343665 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:42:39.349646 systemd[1]: Stopped target timers.target. Feb 12 19:42:39.351800 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:42:39.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.351932 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:42:39.371794 kernel: audit: type=1131 audit(1707766959.355:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.368074 systemd[1]: Stopped target initrd.target. Feb 12 19:42:39.371887 systemd[1]: Stopped target basic.target. Feb 12 19:42:39.375764 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:42:39.379733 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:42:39.384091 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:42:39.388703 systemd[1]: Stopped target remote-fs.target. Feb 12 19:42:39.392879 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:42:39.396825 systemd[1]: Stopped target sysinit.target. Feb 12 19:42:39.401040 systemd[1]: Stopped target local-fs.target. Feb 12 19:42:39.404870 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:42:39.408873 systemd[1]: Stopped target swap.target. Feb 12 19:42:39.412800 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:42:39.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.412933 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:42:39.433885 kernel: audit: type=1131 audit(1707766959.416:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.429392 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:42:39.433966 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:42:39.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.434101 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:42:39.455804 kernel: audit: type=1131 audit(1707766959.437:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.451435 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:42:39.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.451586 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:42:39.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.455915 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:42:39.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.456012 systemd[1]: Stopped ignition-files.service. Feb 12 19:42:39.460810 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:42:39.460938 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:42:39.467949 systemd[1]: Stopping ignition-mount.service... Feb 12 19:42:39.481131 iscsid[837]: iscsid shutting down. Feb 12 19:42:39.482550 systemd[1]: Stopping iscsid.service... Feb 12 19:42:39.487704 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:42:39.493283 ignition[1025]: INFO : Ignition 2.14.0 Feb 12 19:42:39.493283 ignition[1025]: INFO : Stage: umount Feb 12 19:42:39.498038 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:42:39.498038 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:42:39.508684 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:42:39.509789 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:42:39.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.515940 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:42:39.516616 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:42:39.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.524739 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:42:39.525801 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:42:39.525895 systemd[1]: Stopped iscsid.service. Feb 12 19:42:39.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.534729 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:42:39.534824 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:42:39.541206 ignition[1025]: INFO : umount: umount passed Feb 12 19:42:39.541206 ignition[1025]: INFO : Ignition finished successfully Feb 12 19:42:39.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.541500 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:42:39.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.541585 systemd[1]: Stopped ignition-mount.service. Feb 12 19:42:39.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.546088 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:42:39.546130 systemd[1]: Stopped ignition-disks.service. Feb 12 19:42:39.550369 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:42:39.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.550416 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:42:39.554816 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:42:39.554862 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:42:39.558822 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:42:39.558871 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:42:39.565056 systemd[1]: Stopped target paths.target. Feb 12 19:42:39.571384 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:42:39.579155 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:42:39.584255 systemd[1]: Stopped target slices.target. Feb 12 19:42:39.586078 systemd[1]: Stopped target sockets.target. Feb 12 19:42:39.590280 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:42:39.590325 systemd[1]: Closed iscsid.socket. Feb 12 19:42:39.595856 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:42:39.597610 systemd[1]: Stopped ignition-setup.service. Feb 12 19:42:39.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.607596 systemd[1]: Stopping iscsiuio.service... Feb 12 19:42:39.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.610569 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:42:39.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.611012 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:42:39.611092 systemd[1]: Stopped iscsiuio.service. Feb 12 19:42:39.613586 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:42:39.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.613664 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:42:39.617886 systemd[1]: Stopped target network.target. Feb 12 19:42:39.622292 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:42:39.622335 systemd[1]: Closed iscsiuio.socket. Feb 12 19:42:39.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.625773 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:42:39.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.625820 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:42:39.630465 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:42:39.654000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:42:39.634523 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:42:39.637364 systemd-networkd[828]: eth0: DHCPv6 lease lost Feb 12 19:42:39.657000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:42:39.639498 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:42:39.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.639587 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:42:39.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.644433 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:42:39.644523 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:42:39.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.651202 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:42:39.651237 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:42:39.656388 systemd[1]: Stopping network-cleanup.service... Feb 12 19:42:39.661684 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:42:39.661743 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:42:39.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.663905 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:42:39.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.663944 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:42:39.668531 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:42:39.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.668577 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:42:39.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.670888 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:42:39.677313 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:42:39.677434 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:42:39.684052 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:42:39.684103 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:42:39.689671 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:42:39.689707 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:42:39.694337 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:42:39.694386 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:42:39.698535 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:42:39.698582 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:42:39.701454 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:42:39.701492 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:42:39.706742 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:42:39.710341 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:42:39.710403 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:42:39.713053 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:42:39.713111 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:42:39.718044 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:42:39.718094 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:42:39.731435 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:42:39.736036 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:42:39.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.780258 kernel: hv_netvsc 000d3ab4-c147-000d-3ab4-c147000d3ab4 eth0: Data path switched from VF: enP17411s1 Feb 12 19:42:39.797521 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:42:39.800420 systemd[1]: Stopped network-cleanup.service. Feb 12 19:42:39.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:39.805113 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:42:39.810234 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:42:39.821446 systemd[1]: Switching root. Feb 12 19:42:39.844567 systemd-journald[183]: Journal stopped Feb 12 19:42:53.732290 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 12 19:42:53.732324 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:42:53.732337 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:42:53.732346 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:42:53.732357 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:42:53.732365 kernel: SELinux: policy capability open_perms=1 Feb 12 19:42:53.732380 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:42:53.732389 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:42:53.732397 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:42:53.732408 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:42:53.732416 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:42:53.732425 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:42:53.732436 systemd[1]: Successfully loaded SELinux policy in 245.927ms. Feb 12 19:42:53.732446 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.891ms. Feb 12 19:42:53.732461 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:42:53.732471 systemd[1]: Detected virtualization microsoft. Feb 12 19:42:53.732483 systemd[1]: Detected architecture x86-64. Feb 12 19:42:53.732492 systemd[1]: Detected first boot. Feb 12 19:42:53.732506 systemd[1]: Hostname set to . Feb 12 19:42:53.732515 systemd[1]: Initializing machine ID from random generator. Feb 12 19:42:53.732524 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:42:53.732537 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 12 19:42:53.732547 kernel: audit: type=1400 audit(1707766964.269:90): avc: denied { associate } for pid=1058 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:42:53.732560 kernel: audit: type=1300 audit(1707766964.269:90): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cedf8 a2=c0000d7ac0 a3=32 items=0 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.732572 kernel: audit: type=1327 audit(1707766964.269:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:42:53.732584 kernel: audit: type=1400 audit(1707766964.276:91): avc: denied { associate } for pid=1058 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:42:53.732593 kernel: audit: type=1300 audit(1707766964.276:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000024105 a2=1ed a3=0 items=2 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.732604 kernel: audit: type=1307 audit(1707766964.276:91): cwd="/" Feb 12 19:42:53.732613 kernel: audit: type=1302 audit(1707766964.276:91): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:53.732623 kernel: audit: type=1302 audit(1707766964.276:91): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:53.732636 kernel: audit: type=1327 audit(1707766964.276:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:42:53.732645 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:42:53.732655 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:42:53.732667 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:42:53.732677 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:42:53.732689 kernel: audit: type=1334 audit(1707766973.205:92): prog-id=12 op=LOAD Feb 12 19:42:53.732697 kernel: audit: type=1334 audit(1707766973.205:93): prog-id=3 op=UNLOAD Feb 12 19:42:53.732707 kernel: audit: type=1334 audit(1707766973.211:94): prog-id=13 op=LOAD Feb 12 19:42:53.732719 kernel: audit: type=1334 audit(1707766973.216:95): prog-id=14 op=LOAD Feb 12 19:42:53.732729 kernel: audit: type=1334 audit(1707766973.216:96): prog-id=4 op=UNLOAD Feb 12 19:42:53.732742 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:42:53.732752 kernel: audit: type=1334 audit(1707766973.216:97): prog-id=5 op=UNLOAD Feb 12 19:42:53.732764 kernel: audit: type=1131 audit(1707766973.217:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.732776 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:42:53.732787 kernel: audit: type=1130 audit(1707766973.262:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.732800 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:42:53.732813 kernel: audit: type=1131 audit(1707766973.262:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.732823 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:42:53.732835 kernel: audit: type=1334 audit(1707766973.304:101): prog-id=12 op=UNLOAD Feb 12 19:42:53.732845 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:42:53.732854 systemd[1]: Created slice system-getty.slice. Feb 12 19:42:53.732866 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:42:53.732876 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:42:53.732890 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:42:53.732900 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:42:53.732912 systemd[1]: Created slice user.slice. Feb 12 19:42:53.732922 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:42:53.732932 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:42:53.732943 systemd[1]: Set up automount boot.automount. Feb 12 19:42:53.732953 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:42:53.732965 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:42:53.732975 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:42:53.732989 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:42:53.733000 systemd[1]: Reached target integritysetup.target. Feb 12 19:42:53.733012 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:42:53.733022 systemd[1]: Reached target remote-fs.target. Feb 12 19:42:53.733034 systemd[1]: Reached target slices.target. Feb 12 19:42:53.733043 systemd[1]: Reached target swap.target. Feb 12 19:42:53.733056 systemd[1]: Reached target torcx.target. Feb 12 19:42:53.733067 systemd[1]: Reached target veritysetup.target. Feb 12 19:42:53.733079 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:42:53.733089 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:42:53.733100 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:42:53.733111 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:42:53.733124 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:42:53.733135 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:42:53.733146 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:42:53.733157 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:42:53.733167 systemd[1]: Mounting media.mount... Feb 12 19:42:53.733179 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:42:53.733189 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:42:53.733202 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:42:53.733213 systemd[1]: Mounting tmp.mount... Feb 12 19:42:53.733226 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:42:53.733251 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:42:53.733263 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:42:53.733275 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:42:53.733287 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:42:53.733297 systemd[1]: Starting modprobe@drm.service... Feb 12 19:42:53.733310 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:42:53.733319 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:42:53.733332 systemd[1]: Starting modprobe@loop.service... Feb 12 19:42:53.733344 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:42:53.733357 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:42:53.733367 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:42:53.733380 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:42:53.733389 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:42:53.733402 systemd[1]: Stopped systemd-journald.service. Feb 12 19:42:53.733412 systemd[1]: Starting systemd-journald.service... Feb 12 19:42:53.733424 kernel: loop: module loaded Feb 12 19:42:53.733434 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:42:53.733448 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:42:53.733458 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:42:53.733470 kernel: fuse: init (API version 7.34) Feb 12 19:42:53.733480 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:42:53.733492 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:42:53.733503 systemd[1]: Stopped verity-setup.service. Feb 12 19:42:53.733513 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:42:53.733525 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:42:53.733535 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:42:53.733549 systemd[1]: Mounted media.mount. Feb 12 19:42:53.733559 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:42:53.733579 systemd-journald[1150]: Journal started Feb 12 19:42:53.733625 systemd-journald[1150]: Runtime Journal (/run/log/journal/4dae67581ed44cef8a2f2cf8320783a4) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:42:42.068000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:42:42.858000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:42:42.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:42:42.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:42:42.874000 audit: BPF prog-id=10 op=LOAD Feb 12 19:42:42.874000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:42:42.874000 audit: BPF prog-id=11 op=LOAD Feb 12 19:42:42.874000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:42:44.269000 audit[1058]: AVC avc: denied { associate } for pid=1058 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:42:44.269000 audit[1058]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d89c a1=c0000cedf8 a2=c0000d7ac0 a3=32 items=0 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:44.269000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:42:44.276000 audit[1058]: AVC avc: denied { associate } for pid=1058 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:42:44.276000 audit[1058]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000024105 a2=1ed a3=0 items=2 ppid=1041 pid=1058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:44.276000 audit: CWD cwd="/" Feb 12 19:42:44.276000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:44.276000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:44.276000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:42:53.205000 audit: BPF prog-id=12 op=LOAD Feb 12 19:42:53.205000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:42:53.211000 audit: BPF prog-id=13 op=LOAD Feb 12 19:42:53.216000 audit: BPF prog-id=14 op=LOAD Feb 12 19:42:53.216000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:42:53.216000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:42:53.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.304000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:42:53.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.624000 audit: BPF prog-id=15 op=LOAD Feb 12 19:42:53.624000 audit: BPF prog-id=16 op=LOAD Feb 12 19:42:53.625000 audit: BPF prog-id=17 op=LOAD Feb 12 19:42:53.625000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:42:53.625000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:42:53.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.728000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:42:53.728000 audit[1150]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff3dd87cf0 a2=4000 a3=7fff3dd87d8c items=0 ppid=1 pid=1150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.728000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:42:44.251959 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:42:53.203475 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:42:44.252885 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:42:53.217368 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:42:44.252907 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:42:44.252948 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:42:44.252959 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:42:44.253005 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:42:44.253020 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:42:44.253236 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:42:44.253304 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:42:44.253321 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:42:44.253960 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:42:44.253998 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:42:44.254019 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:42:44.254036 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:42:44.254055 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:42:44.254072 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:42:51.950567 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:42:51.950799 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:42:51.950917 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:42:51.951086 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:42:51.951133 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:42:51.951186 /usr/lib/systemd/system-generators/torcx-generator[1058]: time="2024-02-12T19:42:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:42:53.739657 systemd[1]: Started systemd-journald.service. Feb 12 19:42:53.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.740467 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:42:53.742842 systemd[1]: Mounted tmp.mount. Feb 12 19:42:53.744829 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:42:53.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.747640 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:42:53.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.749980 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:42:53.750122 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:42:53.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.752465 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:42:53.752600 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:42:53.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.755479 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:42:53.755614 systemd[1]: Finished modprobe@drm.service. Feb 12 19:42:53.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.757837 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:42:53.757972 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:42:53.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.760569 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:42:53.760711 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:42:53.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.762948 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:42:53.763085 systemd[1]: Finished modprobe@loop.service. Feb 12 19:42:53.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.766805 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:42:53.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.769739 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:42:53.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.772560 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:42:53.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.775451 systemd[1]: Reached target network-pre.target. Feb 12 19:42:53.778898 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:42:53.782509 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:42:53.784528 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:42:53.786311 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:42:53.789413 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:42:53.791613 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:42:53.792632 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:42:53.794799 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:42:53.795806 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:42:53.798645 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:42:53.802814 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:42:53.805005 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:42:53.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.827772 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:42:53.830403 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:42:53.860181 systemd-journald[1150]: Time spent on flushing to /var/log/journal/4dae67581ed44cef8a2f2cf8320783a4 is 23.193ms for 1193 entries. Feb 12 19:42:53.860181 systemd-journald[1150]: System Journal (/var/log/journal/4dae67581ed44cef8a2f2cf8320783a4) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:42:53.944903 systemd-journald[1150]: Received client request to flush runtime journal. Feb 12 19:42:53.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.871139 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:42:53.946140 udevadm[1182]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:42:53.878563 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:42:53.882031 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:42:53.946040 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:42:53.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:54.456340 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:42:54.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:54.460399 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:42:54.821368 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:42:54.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:54.986062 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:42:54.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:54.988000 audit: BPF prog-id=18 op=LOAD Feb 12 19:42:54.989000 audit: BPF prog-id=19 op=LOAD Feb 12 19:42:54.989000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:42:54.989000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:42:54.990039 systemd[1]: Starting systemd-udevd.service... Feb 12 19:42:55.008345 systemd-udevd[1186]: Using default interface naming scheme 'v252'. Feb 12 19:42:55.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:55.215000 audit: BPF prog-id=20 op=LOAD Feb 12 19:42:55.210815 systemd[1]: Started systemd-udevd.service. Feb 12 19:42:55.216571 systemd[1]: Starting systemd-networkd.service... Feb 12 19:42:55.253097 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:42:55.596261 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:42:55.601000 audit: BPF prog-id=21 op=LOAD Feb 12 19:42:55.601000 audit: BPF prog-id=22 op=LOAD Feb 12 19:42:55.601000 audit: BPF prog-id=23 op=LOAD Feb 12 19:42:55.602796 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:42:55.614257 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:42:55.632308 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:42:55.632408 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:42:55.639200 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:42:55.645022 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:42:55.634000 audit[1205]: AVC avc: denied { confidentiality } for pid=1205 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:42:55.653264 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:42:55.657453 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:42:55.671226 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:42:55.671359 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:42:55.634000 audit[1205]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556476d675e0 a1=f884 a2=7f30abb42bc5 a3=5 items=12 ppid=1186 pid=1205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:55.634000 audit: CWD cwd="/" Feb 12 19:42:55.634000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=1 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=2 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=3 name=(null) inode=15254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=4 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=5 name=(null) inode=15255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=6 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=7 name=(null) inode=15256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=8 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=9 name=(null) inode=15257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=10 name=(null) inode=15253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PATH item=11 name=(null) inode=15258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:42:55.634000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:42:55.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:55.663456 systemd[1]: Started systemd-userdbd.service. Feb 12 19:42:56.154070 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:42:56.154147 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:42:56.154184 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:42:56.287910 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 12 19:42:56.308050 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1200) Feb 12 19:42:56.351068 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:42:56.373792 systemd-networkd[1198]: lo: Link UP Feb 12 19:42:56.374134 systemd-networkd[1198]: lo: Gained carrier Feb 12 19:42:56.374795 systemd-networkd[1198]: Enumeration completed Feb 12 19:42:56.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:56.374987 systemd[1]: Started systemd-networkd.service. Feb 12 19:42:56.378831 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:42:56.389105 systemd-networkd[1198]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:42:56.394242 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:42:56.398234 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:42:56.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:56.446884 kernel: mlx5_core 4403:00:02.0 enP17411s1: Link up Feb 12 19:42:56.484884 kernel: hv_netvsc 000d3ab4-c147-000d-3ab4-c147000d3ab4 eth0: Data path switched to VF: enP17411s1 Feb 12 19:42:56.486289 systemd-networkd[1198]: enP17411s1: Link UP Feb 12 19:42:56.486556 systemd-networkd[1198]: eth0: Link UP Feb 12 19:42:56.486643 systemd-networkd[1198]: eth0: Gained carrier Feb 12 19:42:56.491145 systemd-networkd[1198]: enP17411s1: Gained carrier Feb 12 19:42:56.525990 systemd-networkd[1198]: eth0: DHCPv4 address 10.200.8.36/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:42:56.672411 lvm[1264]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:42:56.699883 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:42:56.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:56.703198 systemd[1]: Reached target cryptsetup.target. Feb 12 19:42:56.706918 systemd[1]: Starting lvm2-activation.service... Feb 12 19:42:56.711301 lvm[1265]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:42:56.730649 systemd[1]: Finished lvm2-activation.service. Feb 12 19:42:56.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:56.733106 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:42:56.735277 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:42:56.735307 systemd[1]: Reached target local-fs.target. Feb 12 19:42:56.737243 systemd[1]: Reached target machines.target. Feb 12 19:42:56.740365 systemd[1]: Starting ldconfig.service... Feb 12 19:42:56.742617 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:42:56.742715 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:42:56.743843 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:42:56.747015 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:42:56.751612 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:42:56.754058 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:42:56.754153 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:42:56.755687 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:42:56.771656 systemd-tmpfiles[1270]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:42:56.780541 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:42:56.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:56.787079 systemd-tmpfiles[1270]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:42:56.787960 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1267 (bootctl) Feb 12 19:42:56.789418 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:42:56.802637 systemd-tmpfiles[1270]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:42:56.939184 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:42:56.939727 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:42:56.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:57.670993 systemd-fsck[1275]: fsck.fat 4.2 (2021-01-31) Feb 12 19:42:57.670993 systemd-fsck[1275]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 19:42:57.673400 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:42:57.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:57.678419 systemd[1]: Mounting boot.mount... Feb 12 19:42:57.690701 systemd[1]: Mounted boot.mount. Feb 12 19:42:57.703811 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:42:57.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:57.962020 systemd-networkd[1198]: eth0: Gained IPv6LL Feb 12 19:42:57.967663 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:42:57.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.410510 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:42:58.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.414635 systemd[1]: Starting audit-rules.service... Feb 12 19:42:58.417846 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:42:58.421664 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:42:58.423000 audit: BPF prog-id=24 op=LOAD Feb 12 19:42:58.426462 systemd[1]: Starting systemd-resolved.service... Feb 12 19:42:58.428000 audit: BPF prog-id=25 op=LOAD Feb 12 19:42:58.432096 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:42:58.435398 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:42:58.468000 audit[1286]: SYSTEM_BOOT pid=1286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.471902 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:42:58.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.519394 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:42:58.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.521892 systemd[1]: Reached target time-set.target. Feb 12 19:42:58.528674 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:42:58.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.531580 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:42:58.544575 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:42:58.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.564583 systemd-resolved[1284]: Positive Trust Anchors: Feb 12 19:42:58.564597 systemd-resolved[1284]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:42:58.564639 systemd-resolved[1284]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:42:58.668044 systemd-resolved[1284]: Using system hostname 'ci-3510.3.2-a-3bedefc55b'. Feb 12 19:42:58.669592 systemd[1]: Started systemd-resolved.service. Feb 12 19:42:58.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.672044 systemd[1]: Reached target network.target. Feb 12 19:42:58.674737 kernel: kauditd_printk_skb: 81 callbacks suppressed Feb 12 19:42:58.674802 kernel: audit: type=1130 audit(1707766978.670:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.687590 systemd[1]: Reached target network-online.target. Feb 12 19:42:58.689910 systemd[1]: Reached target nss-lookup.target. Feb 12 19:42:58.739000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:42:58.741398 augenrules[1302]: No rules Feb 12 19:42:58.742419 systemd[1]: Finished audit-rules.service. Feb 12 19:42:58.750888 kernel: audit: type=1305 audit(1707766978.739:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:42:58.750955 kernel: audit: type=1300 audit(1707766978.739:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce9eb7820 a2=420 a3=0 items=0 ppid=1281 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:58.750981 kernel: audit: type=1327 audit(1707766978.739:167): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:42:58.739000 audit[1302]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce9eb7820 a2=420 a3=0 items=0 ppid=1281 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:58.739000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:42:58.815414 systemd-timesyncd[1285]: Contacted time server 77.68.25.145:123 (0.flatcar.pool.ntp.org). Feb 12 19:42:58.815505 systemd-timesyncd[1285]: Initial clock synchronization to Mon 2024-02-12 19:42:58.813425 UTC. Feb 12 19:43:04.083430 ldconfig[1266]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:43:04.091953 systemd[1]: Finished ldconfig.service. Feb 12 19:43:04.095987 systemd[1]: Starting systemd-update-done.service... Feb 12 19:43:04.117635 systemd[1]: Finished systemd-update-done.service. Feb 12 19:43:04.120415 systemd[1]: Reached target sysinit.target. Feb 12 19:43:04.122487 systemd[1]: Started motdgen.path. Feb 12 19:43:04.124217 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:43:04.127243 systemd[1]: Started logrotate.timer. Feb 12 19:43:04.129633 systemd[1]: Started mdadm.timer. Feb 12 19:43:04.131581 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:43:04.133720 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:43:04.133758 systemd[1]: Reached target paths.target. Feb 12 19:43:04.135655 systemd[1]: Reached target timers.target. Feb 12 19:43:04.138015 systemd[1]: Listening on dbus.socket. Feb 12 19:43:04.141021 systemd[1]: Starting docker.socket... Feb 12 19:43:04.159634 systemd[1]: Listening on sshd.socket. Feb 12 19:43:04.161856 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:43:04.162330 systemd[1]: Listening on docker.socket. Feb 12 19:43:04.164583 systemd[1]: Reached target sockets.target. Feb 12 19:43:04.166745 systemd[1]: Reached target basic.target. Feb 12 19:43:04.169000 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:43:04.169034 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:43:04.170151 systemd[1]: Starting containerd.service... Feb 12 19:43:04.173155 systemd[1]: Starting dbus.service... Feb 12 19:43:04.176398 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:43:04.180189 systemd[1]: Starting extend-filesystems.service... Feb 12 19:43:04.182322 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:43:04.183733 systemd[1]: Starting motdgen.service... Feb 12 19:43:04.187082 systemd[1]: Started nvidia.service. Feb 12 19:43:04.190937 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:43:04.196399 systemd[1]: Starting prepare-critools.service... Feb 12 19:43:04.199616 systemd[1]: Starting prepare-helm.service... Feb 12 19:43:04.202949 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:43:04.206581 systemd[1]: Starting sshd-keygen.service... Feb 12 19:43:04.211943 systemd[1]: Starting systemd-logind.service... Feb 12 19:43:04.214213 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:43:04.214293 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:43:04.214786 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:43:04.215903 systemd[1]: Starting update-engine.service... Feb 12 19:43:04.219959 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:43:04.229626 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:43:04.230435 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:43:04.248505 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:43:04.248715 systemd[1]: Finished motdgen.service. Feb 12 19:43:04.275897 jq[1312]: false Feb 12 19:43:04.276364 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:43:04.276552 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:43:04.277304 jq[1330]: true Feb 12 19:43:04.281465 extend-filesystems[1313]: Found sda Feb 12 19:43:04.281465 extend-filesystems[1313]: Found sda1 Feb 12 19:43:04.281465 extend-filesystems[1313]: Found sda2 Feb 12 19:43:04.281465 extend-filesystems[1313]: Found sda3 Feb 12 19:43:04.281465 extend-filesystems[1313]: Found usr Feb 12 19:43:04.310638 env[1337]: time="2024-02-12T19:43:04.291973831Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:43:04.310873 extend-filesystems[1313]: Found sda4 Feb 12 19:43:04.310873 extend-filesystems[1313]: Found sda6 Feb 12 19:43:04.310873 extend-filesystems[1313]: Found sda7 Feb 12 19:43:04.310873 extend-filesystems[1313]: Found sda9 Feb 12 19:43:04.310873 extend-filesystems[1313]: Checking size of /dev/sda9 Feb 12 19:43:04.326905 jq[1346]: true Feb 12 19:43:04.333816 systemd-logind[1325]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 12 19:43:04.338344 env[1337]: time="2024-02-12T19:43:04.338301815Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:43:04.338567 env[1337]: time="2024-02-12T19:43:04.338549194Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340064 env[1337]: time="2024-02-12T19:43:04.340026369Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340179 env[1337]: time="2024-02-12T19:43:04.340160157Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340518 env[1337]: time="2024-02-12T19:43:04.340489530Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340622 env[1337]: time="2024-02-12T19:43:04.340604520Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340699 env[1337]: time="2024-02-12T19:43:04.340683013Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:43:04.340771 env[1337]: time="2024-02-12T19:43:04.340756007Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.340963 env[1337]: time="2024-02-12T19:43:04.340941991Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.341338 env[1337]: time="2024-02-12T19:43:04.341314260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:04.341582 env[1337]: time="2024-02-12T19:43:04.341558539Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:04.341665 env[1337]: time="2024-02-12T19:43:04.341648932Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:43:04.341798 env[1337]: time="2024-02-12T19:43:04.341780021Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:43:04.341893 env[1337]: time="2024-02-12T19:43:04.341858214Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:43:04.343677 systemd-logind[1325]: New seat seat0. Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.355800835Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.355836432Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.355894027Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.355986819Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356009417Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356040015Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356058113Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356077012Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356094210Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356127008Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356144206Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356161505Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356295693Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:43:04.358455 env[1337]: time="2024-02-12T19:43:04.356402384Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.356802850Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.356839447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.356903542Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357017532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357037331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357066528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357083327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357101025Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357118224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357145121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357161320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357180918Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357343305Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357375302Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.359635 env[1337]: time="2024-02-12T19:43:04.357393900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.360197 env[1337]: time="2024-02-12T19:43:04.357409499Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:43:04.360197 env[1337]: time="2024-02-12T19:43:04.357430297Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:43:04.360197 env[1337]: time="2024-02-12T19:43:04.357458495Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:43:04.360197 env[1337]: time="2024-02-12T19:43:04.357490392Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:43:04.360197 env[1337]: time="2024-02-12T19:43:04.357542988Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.357847362Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.357935255Z" level=info msg="Connect containerd service" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.357984550Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.358740087Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.358885774Z" level=info msg="Start subscribing containerd event" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.358937970Z" level=info msg="Start recovering state" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.359001864Z" level=info msg="Start event monitor" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.359022363Z" level=info msg="Start snapshots syncer" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.359033962Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.359044061Z" level=info msg="Start streaming server" Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.359990281Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:43:04.360387 env[1337]: time="2024-02-12T19:43:04.360086773Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:43:04.398236 env[1337]: time="2024-02-12T19:43:04.365765493Z" level=info msg="containerd successfully booted in 0.077012s" Feb 12 19:43:04.398280 extend-filesystems[1313]: Old size kept for /dev/sda9 Feb 12 19:43:04.398280 extend-filesystems[1313]: Found sr0 Feb 12 19:43:04.363162 systemd[1]: Started containerd.service. Feb 12 19:43:04.415938 tar[1334]: crictl Feb 12 19:43:04.416206 tar[1333]: ./ Feb 12 19:43:04.416206 tar[1333]: ./loopback Feb 12 19:43:04.416411 tar[1335]: linux-amd64/helm Feb 12 19:43:04.370563 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:43:04.370753 systemd[1]: Finished extend-filesystems.service. Feb 12 19:43:04.471762 bash[1367]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:43:04.472145 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:43:04.487917 dbus-daemon[1311]: [system] SELinux support is enabled Feb 12 19:43:04.488070 systemd[1]: Started dbus.service. Feb 12 19:43:04.492824 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:43:04.492850 systemd[1]: Reached target system-config.target. Feb 12 19:43:04.496512 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:43:04.496534 systemd[1]: Reached target user-config.target. Feb 12 19:43:04.506387 systemd[1]: Started systemd-logind.service. Feb 12 19:43:04.509361 dbus-daemon[1311]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:43:04.567718 tar[1333]: ./bandwidth Feb 12 19:43:04.582942 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:43:04.712226 tar[1333]: ./ptp Feb 12 19:43:04.811240 tar[1333]: ./vlan Feb 12 19:43:04.904007 tar[1333]: ./host-device Feb 12 19:43:04.993157 tar[1333]: ./tuning Feb 12 19:43:05.078002 tar[1333]: ./vrf Feb 12 19:43:05.163976 tar[1333]: ./sbr Feb 12 19:43:05.253365 tar[1333]: ./tap Feb 12 19:43:05.289912 update_engine[1327]: I0212 19:43:05.289353 1327 main.cc:92] Flatcar Update Engine starting Feb 12 19:43:05.337572 systemd[1]: Started update-engine.service. Feb 12 19:43:05.338040 update_engine[1327]: I0212 19:43:05.337610 1327 update_check_scheduler.cc:74] Next update check in 4m51s Feb 12 19:43:05.342404 systemd[1]: Started locksmithd.service. Feb 12 19:43:05.364271 tar[1333]: ./dhcp Feb 12 19:43:05.545822 tar[1335]: linux-amd64/LICENSE Feb 12 19:43:05.548777 tar[1335]: linux-amd64/README.md Feb 12 19:43:05.559042 systemd[1]: Finished prepare-helm.service. Feb 12 19:43:05.577084 systemd[1]: Finished prepare-critools.service. Feb 12 19:43:05.580339 tar[1333]: ./static Feb 12 19:43:05.609739 tar[1333]: ./firewall Feb 12 19:43:05.658327 tar[1333]: ./macvlan Feb 12 19:43:05.702449 tar[1333]: ./dummy Feb 12 19:43:05.745942 tar[1333]: ./bridge Feb 12 19:43:05.793775 tar[1333]: ./ipvlan Feb 12 19:43:05.838296 tar[1333]: ./portmap Feb 12 19:43:05.880339 tar[1333]: ./host-local Feb 12 19:43:05.936153 sshd_keygen[1331]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:43:05.959039 systemd[1]: Finished sshd-keygen.service. Feb 12 19:43:05.962699 systemd[1]: Starting issuegen.service... Feb 12 19:43:05.965857 systemd[1]: Started waagent.service. Feb 12 19:43:05.971800 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:43:05.974793 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:43:05.974981 systemd[1]: Finished issuegen.service. Feb 12 19:43:05.978631 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:43:06.002186 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:43:06.006191 systemd[1]: Started getty@tty1.service. Feb 12 19:43:06.010027 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:43:06.012706 systemd[1]: Reached target getty.target. Feb 12 19:43:06.015173 systemd[1]: Reached target multi-user.target. Feb 12 19:43:06.018884 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:43:06.026441 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:43:06.026572 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:43:06.029348 systemd[1]: Startup finished in 838ms (firmware) + 26.826s (loader) + 910ms (kernel) + 1min 57.895s (initrd) + 23.966s (userspace) = 2min 50.437s. Feb 12 19:43:06.388559 login[1435]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:43:06.390651 login[1436]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:43:06.426765 systemd[1]: Created slice user-500.slice. Feb 12 19:43:06.428323 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:43:06.434785 systemd-logind[1325]: New session 1 of user core. Feb 12 19:43:06.438449 systemd-logind[1325]: New session 2 of user core. Feb 12 19:43:06.442421 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:43:06.444285 systemd[1]: Starting user@500.service... Feb 12 19:43:06.461541 (systemd)[1443]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:06.599948 systemd[1443]: Queued start job for default target default.target. Feb 12 19:43:06.600502 systemd[1443]: Reached target paths.target. Feb 12 19:43:06.600530 systemd[1443]: Reached target sockets.target. Feb 12 19:43:06.600547 systemd[1443]: Reached target timers.target. Feb 12 19:43:06.600561 systemd[1443]: Reached target basic.target. Feb 12 19:43:06.600608 systemd[1443]: Reached target default.target. Feb 12 19:43:06.600642 systemd[1443]: Startup finished in 132ms. Feb 12 19:43:06.600925 systemd[1]: Started user@500.service. Feb 12 19:43:06.602322 systemd[1]: Started session-1.scope. Feb 12 19:43:06.603157 systemd[1]: Started session-2.scope. Feb 12 19:43:07.165109 locksmithd[1417]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:43:12.363981 waagent[1430]: 2024-02-12T19:43:12.363827Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:43:12.369149 waagent[1430]: 2024-02-12T19:43:12.369053Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:43:12.371672 waagent[1430]: 2024-02-12T19:43:12.371605Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:43:12.374472 waagent[1430]: 2024-02-12T19:43:12.374391Z INFO Daemon Daemon Run daemon Feb 12 19:43:12.377094 waagent[1430]: 2024-02-12T19:43:12.377030Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:43:12.388478 waagent[1430]: 2024-02-12T19:43:12.388358Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:43:12.396782 waagent[1430]: 2024-02-12T19:43:12.396678Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:43:12.401879 waagent[1430]: 2024-02-12T19:43:12.401797Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:43:12.404713 waagent[1430]: 2024-02-12T19:43:12.404653Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:43:12.408055 waagent[1430]: 2024-02-12T19:43:12.407998Z INFO Daemon Daemon Activate resource disk Feb 12 19:43:12.410777 waagent[1430]: 2024-02-12T19:43:12.410717Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:43:12.421097 waagent[1430]: 2024-02-12T19:43:12.421035Z INFO Daemon Daemon Found device: None Feb 12 19:43:12.423974 waagent[1430]: 2024-02-12T19:43:12.423916Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:43:12.428150 waagent[1430]: 2024-02-12T19:43:12.428070Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.429223Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.430310Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.439418Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.442167Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.442985Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:43:12.455290 waagent[1430]: 2024-02-12T19:43:12.443808Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:43:12.548895 waagent[1430]: 2024-02-12T19:43:12.544635Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:43:12.647185 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:43:12.686888 waagent[1430]: 2024-02-12T19:43:12.686739Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:43:12.689979 waagent[1430]: 2024-02-12T19:43:12.689906Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:43:12.693083 waagent[1430]: 2024-02-12T19:43:12.693012Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:43:12.696582 waagent[1430]: 2024-02-12T19:43:12.696514Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:43:12.699720 waagent[1430]: 2024-02-12T19:43:12.699656Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:43:12.702506 waagent[1430]: 2024-02-12T19:43:12.702444Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:43:12.844347 waagent[1430]: 2024-02-12T19:43:12.844270Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:43:12.852926 waagent[1430]: 2024-02-12T19:43:12.845199Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:43:12.852926 waagent[1430]: 2024-02-12T19:43:12.845980Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:43:13.319996 waagent[1430]: 2024-02-12T19:43:13.319826Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:43:13.332202 waagent[1430]: 2024-02-12T19:43:13.332115Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:43:13.335460 waagent[1430]: 2024-02-12T19:43:13.335386Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:43:13.417104 waagent[1430]: 2024-02-12T19:43:13.416971Z INFO Daemon Daemon Found private key matching thumbprint 7B15B499A7D51388C87A7842FC5BB0BA49F41717 Feb 12 19:43:13.427920 waagent[1430]: 2024-02-12T19:43:13.417493Z INFO Daemon Daemon Certificate with thumbprint AD2188F15E28D685B8FE81FE424D26FC981560A6 has no matching private key. Feb 12 19:43:13.427920 waagent[1430]: 2024-02-12T19:43:13.418721Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:43:13.457476 waagent[1430]: 2024-02-12T19:43:13.457399Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: bd839ee4-a249-4fe6-bbf3-36678f7d13d8 New eTag: 13840927636210052210] Feb 12 19:43:13.465422 waagent[1430]: 2024-02-12T19:43:13.458387Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:43:13.466976 waagent[1430]: 2024-02-12T19:43:13.466923Z INFO Daemon Daemon Starting provisioning Feb 12 19:43:13.481302 waagent[1430]: 2024-02-12T19:43:13.467201Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:43:13.481302 waagent[1430]: 2024-02-12T19:43:13.468290Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-3bedefc55b] Feb 12 19:43:13.481302 waagent[1430]: 2024-02-12T19:43:13.472115Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-3bedefc55b] Feb 12 19:43:13.481302 waagent[1430]: 2024-02-12T19:43:13.473040Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:43:13.481302 waagent[1430]: 2024-02-12T19:43:13.473988Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:43:13.486860 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:43:13.487123 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:43:13.487197 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:43:13.487554 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:43:13.492916 systemd-networkd[1198]: eth0: DHCPv6 lease lost Feb 12 19:43:13.494324 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:43:13.494480 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:43:13.497025 systemd[1]: Starting systemd-networkd.service... Feb 12 19:43:13.527664 systemd-networkd[1484]: enP17411s1: Link UP Feb 12 19:43:13.527673 systemd-networkd[1484]: enP17411s1: Gained carrier Feb 12 19:43:13.529153 systemd-networkd[1484]: eth0: Link UP Feb 12 19:43:13.529162 systemd-networkd[1484]: eth0: Gained carrier Feb 12 19:43:13.529586 systemd-networkd[1484]: lo: Link UP Feb 12 19:43:13.529596 systemd-networkd[1484]: lo: Gained carrier Feb 12 19:43:13.529926 systemd-networkd[1484]: eth0: Gained IPv6LL Feb 12 19:43:13.530191 systemd-networkd[1484]: Enumeration completed Feb 12 19:43:13.530284 systemd[1]: Started systemd-networkd.service. Feb 12 19:43:13.532511 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:43:13.535605 waagent[1430]: 2024-02-12T19:43:13.535425Z INFO Daemon Daemon Create user account if not exists Feb 12 19:43:13.539106 waagent[1430]: 2024-02-12T19:43:13.539032Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:43:13.542183 waagent[1430]: 2024-02-12T19:43:13.542117Z INFO Daemon Daemon Configure sudoer Feb 12 19:43:13.545964 waagent[1430]: 2024-02-12T19:43:13.542811Z INFO Daemon Daemon Configure sshd Feb 12 19:43:13.545964 waagent[1430]: 2024-02-12T19:43:13.543859Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:43:13.549064 systemd-networkd[1484]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:43:13.584943 systemd-networkd[1484]: eth0: DHCPv4 address 10.200.8.36/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:43:13.587664 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:43:43.809545 waagent[1430]: 2024-02-12T19:43:43.809436Z INFO Daemon Daemon Provisioning complete Feb 12 19:43:43.827425 waagent[1430]: 2024-02-12T19:43:43.827340Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:43:43.835960 waagent[1430]: 2024-02-12T19:43:43.827826Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:43:43.835960 waagent[1430]: 2024-02-12T19:43:43.830044Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:43:44.095503 waagent[1493]: 2024-02-12T19:43:44.095326Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:43:44.096233 waagent[1493]: 2024-02-12T19:43:44.096165Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:44.096385 waagent[1493]: 2024-02-12T19:43:44.096329Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:44.107655 waagent[1493]: 2024-02-12T19:43:44.107585Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:43:44.107812 waagent[1493]: 2024-02-12T19:43:44.107759Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:43:44.168129 waagent[1493]: 2024-02-12T19:43:44.168005Z INFO ExtHandler ExtHandler Found private key matching thumbprint 7B15B499A7D51388C87A7842FC5BB0BA49F41717 Feb 12 19:43:44.168350 waagent[1493]: 2024-02-12T19:43:44.168289Z INFO ExtHandler ExtHandler Certificate with thumbprint AD2188F15E28D685B8FE81FE424D26FC981560A6 has no matching private key. Feb 12 19:43:44.168583 waagent[1493]: 2024-02-12T19:43:44.168533Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:43:44.186697 waagent[1493]: 2024-02-12T19:43:44.186634Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 422171e6-eaa2-4710-94c2-458b1f8f2e90 New eTag: 13840927636210052210] Feb 12 19:43:44.187265 waagent[1493]: 2024-02-12T19:43:44.187206Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:43:44.224888 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 12 19:43:44.249569 waagent[1493]: 2024-02-12T19:43:44.249430Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:43:44.258961 waagent[1493]: 2024-02-12T19:43:44.258882Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1493 Feb 12 19:43:44.262330 waagent[1493]: 2024-02-12T19:43:44.262256Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:43:44.263508 waagent[1493]: 2024-02-12T19:43:44.263451Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:43:44.347674 waagent[1493]: 2024-02-12T19:43:44.347560Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:43:44.348062 waagent[1493]: 2024-02-12T19:43:44.347995Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:43:44.355798 waagent[1493]: 2024-02-12T19:43:44.355742Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:43:44.356266 waagent[1493]: 2024-02-12T19:43:44.356206Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:43:44.357303 waagent[1493]: 2024-02-12T19:43:44.357239Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:43:44.358558 waagent[1493]: 2024-02-12T19:43:44.358498Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:43:44.359211 waagent[1493]: 2024-02-12T19:43:44.359156Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:44.359788 waagent[1493]: 2024-02-12T19:43:44.359730Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:43:44.359924 waagent[1493]: 2024-02-12T19:43:44.359841Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:44.360214 waagent[1493]: 2024-02-12T19:43:44.360160Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:44.360711 waagent[1493]: 2024-02-12T19:43:44.360652Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:43:44.361404 waagent[1493]: 2024-02-12T19:43:44.361346Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:43:44.361639 waagent[1493]: 2024-02-12T19:43:44.361585Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:43:44.362372 waagent[1493]: 2024-02-12T19:43:44.362317Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:44.362623 waagent[1493]: 2024-02-12T19:43:44.362567Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:43:44.362856 waagent[1493]: 2024-02-12T19:43:44.362806Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:43:44.362949 waagent[1493]: 2024-02-12T19:43:44.362887Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:43:44.362949 waagent[1493]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:43:44.362949 waagent[1493]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:43:44.362949 waagent[1493]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:43:44.362949 waagent[1493]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:44.362949 waagent[1493]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:44.362949 waagent[1493]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:44.365603 waagent[1493]: 2024-02-12T19:43:44.365399Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:43:44.367297 waagent[1493]: 2024-02-12T19:43:44.367235Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:43:44.369719 waagent[1493]: 2024-02-12T19:43:44.369669Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:43:44.371596 waagent[1493]: 2024-02-12T19:43:44.371541Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:43:44.381040 waagent[1493]: 2024-02-12T19:43:44.380991Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:43:44.381843 waagent[1493]: 2024-02-12T19:43:44.381799Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:43:44.382801 waagent[1493]: 2024-02-12T19:43:44.382740Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:43:44.426682 waagent[1493]: 2024-02-12T19:43:44.426612Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1484' Feb 12 19:43:44.431859 waagent[1493]: 2024-02-12T19:43:44.431793Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:43:44.527153 waagent[1493]: 2024-02-12T19:43:44.527067Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:43:44.527153 waagent[1493]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:43:44.527153 waagent[1493]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:43:44.527153 waagent[1493]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b4:c1:47 brd ff:ff:ff:ff:ff:ff Feb 12 19:43:44.527153 waagent[1493]: 3: enP17411s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b4:c1:47 brd ff:ff:ff:ff:ff:ff\ altname enP17411p0s2 Feb 12 19:43:44.527153 waagent[1493]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:43:44.527153 waagent[1493]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:43:44.527153 waagent[1493]: 2: eth0 inet 10.200.8.36/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:43:44.527153 waagent[1493]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:43:44.527153 waagent[1493]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:43:44.527153 waagent[1493]: 2: eth0 inet6 fe80::20d:3aff:feb4:c147/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:43:44.735658 waagent[1493]: 2024-02-12T19:43:44.735536Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:43:44.739556 waagent[1493]: 2024-02-12T19:43:44.739448Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:43:44.739556 waagent[1493]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:44.739556 waagent[1493]: pkts bytes target prot opt in out source destination Feb 12 19:43:44.739556 waagent[1493]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:44.739556 waagent[1493]: pkts bytes target prot opt in out source destination Feb 12 19:43:44.739556 waagent[1493]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:44.739556 waagent[1493]: pkts bytes target prot opt in out source destination Feb 12 19:43:44.739556 waagent[1493]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:43:44.739556 waagent[1493]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:43:44.741414 waagent[1493]: 2024-02-12T19:43:44.741354Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:43:44.749881 waagent[1493]: 2024-02-12T19:43:44.749818Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:43:44.834274 waagent[1430]: 2024-02-12T19:43:44.834118Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:43:44.840578 waagent[1430]: 2024-02-12T19:43:44.840499Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:43:45.814168 waagent[1534]: 2024-02-12T19:43:45.814054Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:43:45.814859 waagent[1534]: 2024-02-12T19:43:45.814788Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:43:45.815026 waagent[1534]: 2024-02-12T19:43:45.814970Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:43:45.824622 waagent[1534]: 2024-02-12T19:43:45.824510Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:43:45.825035 waagent[1534]: 2024-02-12T19:43:45.824974Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:45.825204 waagent[1534]: 2024-02-12T19:43:45.825153Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:45.836960 waagent[1534]: 2024-02-12T19:43:45.836885Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:43:45.846190 waagent[1534]: 2024-02-12T19:43:45.846122Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:43:45.847125 waagent[1534]: 2024-02-12T19:43:45.847065Z INFO ExtHandler Feb 12 19:43:45.847274 waagent[1534]: 2024-02-12T19:43:45.847224Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 2067601e-5fec-41b0-89a9-3b0249521556 eTag: 13840927636210052210 source: Fabric] Feb 12 19:43:45.847985 waagent[1534]: 2024-02-12T19:43:45.847928Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:43:45.849064 waagent[1534]: 2024-02-12T19:43:45.849004Z INFO ExtHandler Feb 12 19:43:45.849200 waagent[1534]: 2024-02-12T19:43:45.849150Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:43:45.855584 waagent[1534]: 2024-02-12T19:43:45.855533Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:43:45.856024 waagent[1534]: 2024-02-12T19:43:45.855976Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:43:45.876164 waagent[1534]: 2024-02-12T19:43:45.876104Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:43:45.937778 waagent[1534]: 2024-02-12T19:43:45.937649Z INFO ExtHandler Downloaded certificate {'thumbprint': 'AD2188F15E28D685B8FE81FE424D26FC981560A6', 'hasPrivateKey': False} Feb 12 19:43:45.938748 waagent[1534]: 2024-02-12T19:43:45.938672Z INFO ExtHandler Downloaded certificate {'thumbprint': '7B15B499A7D51388C87A7842FC5BB0BA49F41717', 'hasPrivateKey': True} Feb 12 19:43:45.939743 waagent[1534]: 2024-02-12T19:43:45.939677Z INFO ExtHandler Fetch goal state completed Feb 12 19:43:45.963141 waagent[1534]: 2024-02-12T19:43:45.963065Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1534 Feb 12 19:43:45.966423 waagent[1534]: 2024-02-12T19:43:45.966359Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:43:45.967834 waagent[1534]: 2024-02-12T19:43:45.967776Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:43:45.972774 waagent[1534]: 2024-02-12T19:43:45.972717Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:43:45.973155 waagent[1534]: 2024-02-12T19:43:45.973099Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:43:45.981019 waagent[1534]: 2024-02-12T19:43:45.980965Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:43:45.981466 waagent[1534]: 2024-02-12T19:43:45.981409Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:43:46.005736 waagent[1534]: 2024-02-12T19:43:46.005630Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:43:46.008487 waagent[1534]: 2024-02-12T19:43:46.008387Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:43:46.013146 waagent[1534]: 2024-02-12T19:43:46.013087Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:43:46.014540 waagent[1534]: 2024-02-12T19:43:46.014481Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:43:46.015447 waagent[1534]: 2024-02-12T19:43:46.015391Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:46.015613 waagent[1534]: 2024-02-12T19:43:46.015560Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:43:46.015691 waagent[1534]: 2024-02-12T19:43:46.015637Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:43:46.016043 waagent[1534]: 2024-02-12T19:43:46.015991Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:46.016465 waagent[1534]: 2024-02-12T19:43:46.016413Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:43:46.016692 waagent[1534]: 2024-02-12T19:43:46.016623Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:43:46.017272 waagent[1534]: 2024-02-12T19:43:46.017215Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:43:46.017353 waagent[1534]: 2024-02-12T19:43:46.017298Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:43:46.018269 waagent[1534]: 2024-02-12T19:43:46.018212Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:43:46.018724 waagent[1534]: 2024-02-12T19:43:46.018670Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:43:46.019193 waagent[1534]: 2024-02-12T19:43:46.019135Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:43:46.019511 waagent[1534]: 2024-02-12T19:43:46.019449Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:43:46.019666 waagent[1534]: 2024-02-12T19:43:46.019604Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:43:46.020148 waagent[1534]: 2024-02-12T19:43:46.020095Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:43:46.020231 waagent[1534]: 2024-02-12T19:43:46.020171Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:43:46.020231 waagent[1534]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:43:46.020231 waagent[1534]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:43:46.020231 waagent[1534]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:43:46.020231 waagent[1534]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:46.020231 waagent[1534]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:46.020231 waagent[1534]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:43:46.049343 waagent[1534]: 2024-02-12T19:43:46.049272Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:43:46.049608 waagent[1534]: 2024-02-12T19:43:46.049556Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:43:46.054643 waagent[1534]: 2024-02-12T19:43:46.054534Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:43:46.054643 waagent[1534]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:43:46.054643 waagent[1534]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:43:46.054643 waagent[1534]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b4:c1:47 brd ff:ff:ff:ff:ff:ff Feb 12 19:43:46.054643 waagent[1534]: 3: enP17411s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b4:c1:47 brd ff:ff:ff:ff:ff:ff\ altname enP17411p0s2 Feb 12 19:43:46.054643 waagent[1534]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:43:46.054643 waagent[1534]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:43:46.054643 waagent[1534]: 2: eth0 inet 10.200.8.36/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:43:46.054643 waagent[1534]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:43:46.054643 waagent[1534]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:43:46.054643 waagent[1534]: 2: eth0 inet6 fe80::20d:3aff:feb4:c147/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:43:46.100702 waagent[1534]: 2024-02-12T19:43:46.100601Z INFO ExtHandler ExtHandler Feb 12 19:43:46.106269 waagent[1534]: 2024-02-12T19:43:46.106195Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 54a55dc1-0564-421b-9c4c-1cdb62535a47 correlation d7a2537d-2ec3-45ea-b6b1-dbcca33760f7 created: 2024-02-12T19:40:05.733940Z] Feb 12 19:43:46.111838 waagent[1534]: 2024-02-12T19:43:46.111713Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:43:46.114139 waagent[1534]: 2024-02-12T19:43:46.114078Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 13 ms] Feb 12 19:43:46.120052 waagent[1534]: 2024-02-12T19:43:46.119988Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:43:46.120052 waagent[1534]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:46.120052 waagent[1534]: pkts bytes target prot opt in out source destination Feb 12 19:43:46.120052 waagent[1534]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:46.120052 waagent[1534]: pkts bytes target prot opt in out source destination Feb 12 19:43:46.120052 waagent[1534]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:43:46.120052 waagent[1534]: pkts bytes target prot opt in out source destination Feb 12 19:43:46.120052 waagent[1534]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:43:46.120052 waagent[1534]: 83 11292 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:43:46.120052 waagent[1534]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:43:46.140977 waagent[1534]: 2024-02-12T19:43:46.140912Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:43:46.152671 waagent[1534]: 2024-02-12T19:43:46.152595Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 11D76B97-BAA7-4C44-92A4-59E580E4F2A7;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:43:50.294472 update_engine[1327]: I0212 19:43:50.294370 1327 update_attempter.cc:509] Updating boot flags... Feb 12 19:44:15.029318 systemd[1]: Created slice system-sshd.slice. Feb 12 19:44:15.031062 systemd[1]: Started sshd@0-10.200.8.36:22-10.200.12.6:60840.service. Feb 12 19:44:15.873272 sshd[1642]: Accepted publickey for core from 10.200.12.6 port 60840 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:15.874798 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:15.878420 systemd-logind[1325]: New session 3 of user core. Feb 12 19:44:15.879967 systemd[1]: Started session-3.scope. Feb 12 19:44:16.405240 systemd[1]: Started sshd@1-10.200.8.36:22-10.200.12.6:60842.service. Feb 12 19:44:17.026037 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 60842 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:17.027674 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:17.033361 systemd[1]: Started session-4.scope. Feb 12 19:44:17.033837 systemd-logind[1325]: New session 4 of user core. Feb 12 19:44:17.461832 sshd[1647]: pam_unix(sshd:session): session closed for user core Feb 12 19:44:17.465274 systemd[1]: sshd@1-10.200.8.36:22-10.200.12.6:60842.service: Deactivated successfully. Feb 12 19:44:17.466321 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:44:17.467159 systemd-logind[1325]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:44:17.468081 systemd-logind[1325]: Removed session 4. Feb 12 19:44:17.567430 systemd[1]: Started sshd@2-10.200.8.36:22-10.200.12.6:40656.service. Feb 12 19:44:18.185964 sshd[1653]: Accepted publickey for core from 10.200.12.6 port 40656 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:18.187568 sshd[1653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:18.193263 systemd[1]: Started session-5.scope. Feb 12 19:44:18.193820 systemd-logind[1325]: New session 5 of user core. Feb 12 19:44:18.621325 sshd[1653]: pam_unix(sshd:session): session closed for user core Feb 12 19:44:18.624391 systemd[1]: sshd@2-10.200.8.36:22-10.200.12.6:40656.service: Deactivated successfully. Feb 12 19:44:18.625256 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:44:18.625903 systemd-logind[1325]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:44:18.626610 systemd-logind[1325]: Removed session 5. Feb 12 19:44:18.725010 systemd[1]: Started sshd@3-10.200.8.36:22-10.200.12.6:40658.service. Feb 12 19:44:19.343541 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 40658 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:19.345212 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:19.349971 systemd[1]: Started session-6.scope. Feb 12 19:44:19.350553 systemd-logind[1325]: New session 6 of user core. Feb 12 19:44:19.781852 sshd[1659]: pam_unix(sshd:session): session closed for user core Feb 12 19:44:19.785139 systemd[1]: sshd@3-10.200.8.36:22-10.200.12.6:40658.service: Deactivated successfully. Feb 12 19:44:19.786164 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:44:19.786971 systemd-logind[1325]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:44:19.787851 systemd-logind[1325]: Removed session 6. Feb 12 19:44:19.885761 systemd[1]: Started sshd@4-10.200.8.36:22-10.200.12.6:40670.service. Feb 12 19:44:20.508352 sshd[1665]: Accepted publickey for core from 10.200.12.6 port 40670 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:20.510934 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:20.516230 systemd[1]: Started session-7.scope. Feb 12 19:44:20.516832 systemd-logind[1325]: New session 7 of user core. Feb 12 19:44:21.117985 sudo[1668]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:44:21.118314 sudo[1668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:44:21.141077 dbus-daemon[1311]: \xd0\u001d\xda\xd7\xe3U: received setenforce notice (enforcing=-829390112) Feb 12 19:44:21.143128 sudo[1668]: pam_unix(sudo:session): session closed for user root Feb 12 19:44:21.258190 sshd[1665]: pam_unix(sshd:session): session closed for user core Feb 12 19:44:21.261742 systemd[1]: sshd@4-10.200.8.36:22-10.200.12.6:40670.service: Deactivated successfully. Feb 12 19:44:21.262853 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:44:21.263680 systemd-logind[1325]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:44:21.264691 systemd-logind[1325]: Removed session 7. Feb 12 19:44:21.362192 systemd[1]: Started sshd@5-10.200.8.36:22-10.200.12.6:40686.service. Feb 12 19:44:21.976119 sshd[1672]: Accepted publickey for core from 10.200.12.6 port 40686 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:21.977811 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:21.982806 systemd[1]: Started session-8.scope. Feb 12 19:44:21.983426 systemd-logind[1325]: New session 8 of user core. Feb 12 19:44:22.315329 sudo[1676]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:44:22.315656 sudo[1676]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:44:22.318746 sudo[1676]: pam_unix(sudo:session): session closed for user root Feb 12 19:44:22.323273 sudo[1675]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:44:22.323525 sudo[1675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:44:22.332215 systemd[1]: Stopping audit-rules.service... Feb 12 19:44:22.332000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:44:22.339146 auditctl[1679]: No rules Feb 12 19:44:22.332000 audit[1679]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe7e11b3b0 a2=420 a3=0 items=0 ppid=1 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.339571 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:44:22.339728 systemd[1]: Stopped audit-rules.service. Feb 12 19:44:22.341261 systemd[1]: Starting audit-rules.service... Feb 12 19:44:22.357405 kernel: audit: type=1305 audit(1707767062.332:168): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:44:22.357498 kernel: audit: type=1300 audit(1707767062.332:168): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe7e11b3b0 a2=420 a3=0 items=0 ppid=1 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.357539 kernel: audit: type=1327 audit(1707767062.332:168): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:44:22.332000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:44:22.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.363414 augenrules[1696]: No rules Feb 12 19:44:22.364134 systemd[1]: Finished audit-rules.service. Feb 12 19:44:22.366269 sudo[1675]: pam_unix(sudo:session): session closed for user root Feb 12 19:44:22.373065 kernel: audit: type=1131 audit(1707767062.338:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.373127 kernel: audit: type=1130 audit(1707767062.361:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.361000 audit[1675]: USER_END pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.383933 kernel: audit: type=1106 audit(1707767062.361:171): pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.361000 audit[1675]: CRED_DISP pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.407790 kernel: audit: type=1104 audit(1707767062.361:172): pid=1675 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.464304 sshd[1672]: pam_unix(sshd:session): session closed for user core Feb 12 19:44:22.464000 audit[1672]: USER_END pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:22.467463 systemd[1]: sshd@5-10.200.8.36:22-10.200.12.6:40686.service: Deactivated successfully. Feb 12 19:44:22.468426 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:44:22.469735 systemd-logind[1325]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:44:22.470620 systemd-logind[1325]: Removed session 8. Feb 12 19:44:22.464000 audit[1672]: CRED_DISP pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:22.492404 kernel: audit: type=1106 audit(1707767062.464:173): pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:22.492464 kernel: audit: type=1104 audit(1707767062.464:174): pid=1672 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:22.492492 kernel: audit: type=1131 audit(1707767062.465:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.36:22-10.200.12.6:40686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.36:22-10.200.12.6:40686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:22.569341 systemd[1]: Started sshd@6-10.200.8.36:22-10.200.12.6:40690.service. Feb 12 19:44:22.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.36:22-10.200.12.6:40690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:23.189000 audit[1702]: USER_ACCT pid=1702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:23.190686 sshd[1702]: Accepted publickey for core from 10.200.12.6 port 40690 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:44:23.190000 audit[1702]: CRED_ACQ pid=1702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:23.191000 audit[1702]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb5904470 a2=3 a3=0 items=0 ppid=1 pid=1702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:44:23.192391 sshd[1702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:44:23.196999 systemd[1]: Started session-9.scope. Feb 12 19:44:23.197440 systemd-logind[1325]: New session 9 of user core. Feb 12 19:44:23.200000 audit[1702]: USER_START pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:23.202000 audit[1704]: CRED_ACQ pid=1704 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:44:23.530000 audit[1705]: USER_ACCT pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:23.530000 audit[1705]: CRED_REFR pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:23.531489 sudo[1705]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:44:23.531752 sudo[1705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:44:23.532000 audit[1705]: USER_START pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:44:24.397104 systemd[1]: Starting docker.service... Feb 12 19:44:24.455098 env[1720]: time="2024-02-12T19:44:24.455033583Z" level=info msg="Starting up" Feb 12 19:44:24.456388 env[1720]: time="2024-02-12T19:44:24.456362993Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:44:24.456524 env[1720]: time="2024-02-12T19:44:24.456512194Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:44:24.456584 env[1720]: time="2024-02-12T19:44:24.456573194Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:44:24.456626 env[1720]: time="2024-02-12T19:44:24.456618295Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:44:24.458565 env[1720]: time="2024-02-12T19:44:24.458546709Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:44:24.458658 env[1720]: time="2024-02-12T19:44:24.458648010Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:44:24.458712 env[1720]: time="2024-02-12T19:44:24.458702810Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:44:24.458753 env[1720]: time="2024-02-12T19:44:24.458745511Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:44:24.604052 env[1720]: time="2024-02-12T19:44:24.604007595Z" level=info msg="Loading containers: start." Feb 12 19:44:24.654000 audit[1747]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.654000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc7008a300 a2=0 a3=7ffc7008a2ec items=0 ppid=1720 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:44:24.657000 audit[1749]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.657000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdfd6b2390 a2=0 a3=7ffdfd6b237c items=0 ppid=1720 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:44:24.658000 audit[1751]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.658000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffeebc131f0 a2=0 a3=7ffeebc131dc items=0 ppid=1720 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:44:24.660000 audit[1753]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.660000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd6f9daae0 a2=0 a3=7ffd6f9daacc items=0 ppid=1720 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:44:24.662000 audit[1755]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.662000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffece044740 a2=0 a3=7ffece04472c items=0 ppid=1720 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.662000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:44:24.664000 audit[1757]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.664000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0a58d4c0 a2=0 a3=7ffe0a58d4ac items=0 ppid=1720 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:44:24.695000 audit[1759]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.695000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef9483c60 a2=0 a3=7ffef9483c4c items=0 ppid=1720 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.695000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:44:24.697000 audit[1761]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.697000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffcb9aa0c0 a2=0 a3=7fffcb9aa0ac items=0 ppid=1720 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.697000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:44:24.698000 audit[1763]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.698000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe0c3aba90 a2=0 a3=7ffe0c3aba7c items=0 ppid=1720 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:44:24.716000 audit[1767]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.716000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd04b6f030 a2=0 a3=7ffd04b6f01c items=0 ppid=1720 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.716000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:44:24.717000 audit[1768]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.717000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc1d6fd8e0 a2=0 a3=7ffc1d6fd8cc items=0 ppid=1720 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:44:24.774892 kernel: Initializing XFRM netlink socket Feb 12 19:44:24.811396 env[1720]: time="2024-02-12T19:44:24.811339242Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:44:24.884000 audit[1776]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.884000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc7aae9690 a2=0 a3=7ffc7aae967c items=0 ppid=1720 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.884000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:44:24.909000 audit[1779]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.909000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffe57d42f0 a2=0 a3=7fffe57d42dc items=0 ppid=1720 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:44:24.912000 audit[1782]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.912000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd6b917420 a2=0 a3=7ffd6b91740c items=0 ppid=1720 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:44:24.914000 audit[1784]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.914000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff7c47f1d0 a2=0 a3=7fff7c47f1bc items=0 ppid=1720 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:44:24.916000 audit[1786]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.916000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc7675b3a0 a2=0 a3=7ffc7675b38c items=0 ppid=1720 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.916000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:44:24.918000 audit[1788]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.918000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffee04e290 a2=0 a3=7fffee04e27c items=0 ppid=1720 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.918000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:44:24.920000 audit[1790]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.920000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff48fce0a0 a2=0 a3=7fff48fce08c items=0 ppid=1720 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.920000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:44:24.922000 audit[1792]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.922000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc584c60b0 a2=0 a3=7ffc584c609c items=0 ppid=1720 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:44:24.924000 audit[1794]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.924000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffa7f5de80 a2=0 a3=7fffa7f5de6c items=0 ppid=1720 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:44:24.926000 audit[1796]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.926000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd157ea0d0 a2=0 a3=7ffd157ea0bc items=0 ppid=1720 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:44:24.928000 audit[1798]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.928000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe83e6a550 a2=0 a3=7ffe83e6a53c items=0 ppid=1720 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:44:24.929730 systemd-networkd[1484]: docker0: Link UP Feb 12 19:44:24.945000 audit[1802]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.945000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd8ae05e0 a2=0 a3=7ffdd8ae05cc items=0 ppid=1720 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.945000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:44:24.946000 audit[1803]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:24.946000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffedb2d9580 a2=0 a3=7ffedb2d956c items=0 ppid=1720 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:24.946000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:44:24.947852 env[1720]: time="2024-02-12T19:44:24.947812860Z" level=info msg="Loading containers: done." Feb 12 19:44:24.985204 env[1720]: time="2024-02-12T19:44:24.985162639Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:44:24.985384 env[1720]: time="2024-02-12T19:44:24.985360741Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:44:24.985516 env[1720]: time="2024-02-12T19:44:24.985494642Z" level=info msg="Daemon has completed initialization" Feb 12 19:44:25.037921 systemd[1]: Started docker.service. Feb 12 19:44:25.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:25.049952 env[1720]: time="2024-02-12T19:44:25.049897913Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:44:25.067910 systemd[1]: Reloading. Feb 12 19:44:25.154533 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-12T19:44:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:44:25.154570 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-12T19:44:25Z" level=info msg="torcx already run" Feb 12 19:44:25.235093 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:44:25.235114 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:44:25.253969 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit: BPF prog-id=32 op=LOAD Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit: BPF prog-id=33 op=LOAD Feb 12 19:44:25.317000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:44:25.317000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit: BPF prog-id=34 op=LOAD Feb 12 19:44:25.318000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit: BPF prog-id=35 op=LOAD Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.318000 audit: BPF prog-id=36 op=LOAD Feb 12 19:44:25.318000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:44:25.318000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.321000 audit: BPF prog-id=37 op=LOAD Feb 12 19:44:25.321000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.322000 audit: BPF prog-id=38 op=LOAD Feb 12 19:44:25.322000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.324000 audit: BPF prog-id=39 op=LOAD Feb 12 19:44:25.324000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit: BPF prog-id=40 op=LOAD Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.325000 audit: BPF prog-id=41 op=LOAD Feb 12 19:44:25.325000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:44:25.325000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit: BPF prog-id=42 op=LOAD Feb 12 19:44:25.326000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit: BPF prog-id=43 op=LOAD Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.327000 audit: BPF prog-id=44 op=LOAD Feb 12 19:44:25.327000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:44:25.327000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.328000 audit: BPF prog-id=45 op=LOAD Feb 12 19:44:25.328000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:25.329000 audit: BPF prog-id=46 op=LOAD Feb 12 19:44:25.329000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:44:25.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:25.341199 systemd[1]: Started kubelet.service. Feb 12 19:44:25.410236 kubelet[1912]: E0212 19:44:25.410176 1912 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:44:25.411733 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:44:25.411914 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:44:25.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:44:29.468589 env[1337]: time="2024-02-12T19:44:29.468527970Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 12 19:44:30.198712 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3748738119.mount: Deactivated successfully. Feb 12 19:44:32.174309 env[1337]: time="2024-02-12T19:44:32.174247324Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:32.181480 env[1337]: time="2024-02-12T19:44:32.181432768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:32.184980 env[1337]: time="2024-02-12T19:44:32.184932689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:32.189164 env[1337]: time="2024-02-12T19:44:32.189134515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:32.189787 env[1337]: time="2024-02-12T19:44:32.189754418Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 12 19:44:32.199516 env[1337]: time="2024-02-12T19:44:32.199485278Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 12 19:44:34.343931 env[1337]: time="2024-02-12T19:44:34.343872450Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:34.352632 env[1337]: time="2024-02-12T19:44:34.352591101Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:34.359874 env[1337]: time="2024-02-12T19:44:34.359828043Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:34.364703 env[1337]: time="2024-02-12T19:44:34.364671272Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:34.365317 env[1337]: time="2024-02-12T19:44:34.365286075Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 12 19:44:34.375804 env[1337]: time="2024-02-12T19:44:34.375775336Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 12 19:44:35.609700 env[1337]: time="2024-02-12T19:44:35.609642848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:35.618298 env[1337]: time="2024-02-12T19:44:35.618258597Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:35.620152 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:44:35.620414 systemd[1]: Stopped kubelet.service. Feb 12 19:44:35.635578 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 12 19:44:35.635691 kernel: audit: type=1130 audit(1707767075.619:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.622124 systemd[1]: Started kubelet.service. Feb 12 19:44:35.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.646998 kernel: audit: type=1131 audit(1707767075.619:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.647268 env[1337]: time="2024-02-12T19:44:35.647218962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:35.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.659782 kernel: audit: type=1130 audit(1707767075.620:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:35.660655 env[1337]: time="2024-02-12T19:44:35.660619238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:35.661252 env[1337]: time="2024-02-12T19:44:35.661219342Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 12 19:44:35.675767 env[1337]: time="2024-02-12T19:44:35.675732824Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:44:35.687207 kubelet[1940]: E0212 19:44:35.687165 1940 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:44:35.690138 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:44:35.690297 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:44:35.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:44:35.703889 kernel: audit: type=1131 audit(1707767075.689:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:44:36.867028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2802079681.mount: Deactivated successfully. Feb 12 19:44:37.425142 env[1337]: time="2024-02-12T19:44:37.425089343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.431020 env[1337]: time="2024-02-12T19:44:37.430982175Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.434439 env[1337]: time="2024-02-12T19:44:37.434402994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.438088 env[1337]: time="2024-02-12T19:44:37.438058814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.438420 env[1337]: time="2024-02-12T19:44:37.438389315Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 19:44:37.448134 env[1337]: time="2024-02-12T19:44:37.448106368Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:44:37.897171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3359955220.mount: Deactivated successfully. Feb 12 19:44:37.914785 env[1337]: time="2024-02-12T19:44:37.914742304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.921627 env[1337]: time="2024-02-12T19:44:37.921588741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.925513 env[1337]: time="2024-02-12T19:44:37.925482062Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.930292 env[1337]: time="2024-02-12T19:44:37.930262588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:37.930706 env[1337]: time="2024-02-12T19:44:37.930676090Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:44:37.940468 env[1337]: time="2024-02-12T19:44:37.940448043Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 12 19:44:38.476179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3239720100.mount: Deactivated successfully. Feb 12 19:44:43.037533 env[1337]: time="2024-02-12T19:44:43.037466627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:43.043983 env[1337]: time="2024-02-12T19:44:43.043928757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:43.048370 env[1337]: time="2024-02-12T19:44:43.048339478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:43.052464 env[1337]: time="2024-02-12T19:44:43.052427798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:43.052845 env[1337]: time="2024-02-12T19:44:43.052810300Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 12 19:44:43.062943 env[1337]: time="2024-02-12T19:44:43.062917347Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:44:43.592326 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2787397657.mount: Deactivated successfully. Feb 12 19:44:44.299949 env[1337]: time="2024-02-12T19:44:44.299885885Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:44.305301 env[1337]: time="2024-02-12T19:44:44.305263610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:44.310091 env[1337]: time="2024-02-12T19:44:44.310055633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:44.315012 env[1337]: time="2024-02-12T19:44:44.314978755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:44.315519 env[1337]: time="2024-02-12T19:44:44.315486258Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 19:44:45.870361 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:44:45.870618 systemd[1]: Stopped kubelet.service. Feb 12 19:44:45.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.887889 kernel: audit: type=1130 audit(1707767085.869:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.891991 systemd[1]: Started kubelet.service. Feb 12 19:44:45.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.932010 kernel: audit: type=1131 audit(1707767085.869:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.932101 kernel: audit: type=1130 audit(1707767085.891:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:45.976744 kubelet[2026]: E0212 19:44:45.976704 2026 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:44:45.996507 kernel: audit: type=1131 audit(1707767085.979:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:44:45.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:44:45.979499 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:44:45.979651 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:44:47.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:47.560887 systemd[1]: Stopped kubelet.service. Feb 12 19:44:47.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:47.580722 systemd[1]: Reloading. Feb 12 19:44:47.591853 kernel: audit: type=1130 audit(1707767087.560:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:47.591964 kernel: audit: type=1131 audit(1707767087.562:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:47.667336 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-02-12T19:44:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:44:47.667375 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-02-12T19:44:47Z" level=info msg="torcx already run" Feb 12 19:44:47.755249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:44:47.755270 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:44:47.773109 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.867312 kernel: audit: type=1400 audit(1707767087.838:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.867428 kernel: audit: type=1400 audit(1707767087.838:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.880917 kernel: audit: type=1400 audit(1707767087.838:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.894544 kernel: audit: type=1400 audit(1707767087.838:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit: BPF prog-id=47 op=LOAD Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit: BPF prog-id=48 op=LOAD Feb 12 19:44:47.852000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:44:47.852000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit: BPF prog-id=49 op=LOAD Feb 12 19:44:47.866000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit: BPF prog-id=50 op=LOAD Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit: BPF prog-id=51 op=LOAD Feb 12 19:44:47.866000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:44:47.866000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.880000 audit: BPF prog-id=52 op=LOAD Feb 12 19:44:47.880000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:44:47.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.894000 audit: BPF prog-id=53 op=LOAD Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit: BPF prog-id=54 op=LOAD Feb 12 19:44:47.896000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit: BPF prog-id=55 op=LOAD Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.896000 audit: BPF prog-id=56 op=LOAD Feb 12 19:44:47.896000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:44:47.896000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit: BPF prog-id=57 op=LOAD Feb 12 19:44:47.898000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit: BPF prog-id=58 op=LOAD Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.898000 audit: BPF prog-id=59 op=LOAD Feb 12 19:44:47.898000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:44:47.898000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit: BPF prog-id=60 op=LOAD Feb 12 19:44:47.900000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:47.901000 audit: BPF prog-id=61 op=LOAD Feb 12 19:44:47.901000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:44:47.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:47.917947 systemd[1]: Started kubelet.service. Feb 12 19:44:47.967525 kubelet[2118]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:44:47.967854 kubelet[2118]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:44:47.967940 kubelet[2118]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:44:47.968047 kubelet[2118]: I0212 19:44:47.968013 2118 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:44:48.235359 kubelet[2118]: I0212 19:44:48.235324 2118 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:44:48.235359 kubelet[2118]: I0212 19:44:48.235350 2118 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:44:48.235650 kubelet[2118]: I0212 19:44:48.235630 2118 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:44:48.240659 kubelet[2118]: E0212 19:44:48.240636 2118 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.36:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.240836 kubelet[2118]: I0212 19:44:48.240819 2118 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:44:48.245854 kubelet[2118]: I0212 19:44:48.245824 2118 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:44:48.246090 kubelet[2118]: I0212 19:44:48.246070 2118 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:44:48.246242 kubelet[2118]: I0212 19:44:48.246224 2118 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:44:48.246435 kubelet[2118]: I0212 19:44:48.246254 2118 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:44:48.246435 kubelet[2118]: I0212 19:44:48.246265 2118 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:44:48.246622 kubelet[2118]: I0212 19:44:48.246602 2118 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:44:48.246725 kubelet[2118]: I0212 19:44:48.246712 2118 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:44:48.246787 kubelet[2118]: I0212 19:44:48.246731 2118 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:44:48.246787 kubelet[2118]: I0212 19:44:48.246758 2118 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:44:48.246787 kubelet[2118]: I0212 19:44:48.246776 2118 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:44:48.248423 kubelet[2118]: W0212 19:44:48.248373 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.248506 kubelet[2118]: E0212 19:44:48.248440 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.248721 kubelet[2118]: W0212 19:44:48.248682 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-3bedefc55b&limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.248793 kubelet[2118]: E0212 19:44:48.248747 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-3bedefc55b&limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.254771 kubelet[2118]: I0212 19:44:48.254750 2118 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:44:48.255026 kubelet[2118]: W0212 19:44:48.255007 2118 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:44:48.255429 kubelet[2118]: I0212 19:44:48.255405 2118 server.go:1232] "Started kubelet" Feb 12 19:44:48.257005 kubelet[2118]: E0212 19:44:48.256894 2118 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-3bedefc55b.17b3351e5e90cd26", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-3bedefc55b", UID:"ci-3510.3.2-a-3bedefc55b", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-3bedefc55b"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 44, 48, 255388966, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 44, 48, 255388966, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-3bedefc55b"}': 'Post "https://10.200.8.36:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.36:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:44:48.256000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:48.256000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:48.257385 kubelet[2118]: E0212 19:44:48.257303 2118 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:44:48.257385 kubelet[2118]: E0212 19:44:48.257324 2118 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:44:48.256000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006a0690 a1=c000f6c858 a2=c0006a0660 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.256000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:48.257797 kubelet[2118]: I0212 19:44:48.257781 2118 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:44:48.257000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:48.257000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:48.258039 kubelet[2118]: I0212 19:44:48.257975 2118 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:44:48.258394 kubelet[2118]: I0212 19:44:48.258300 2118 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:44:48.258394 kubelet[2118]: I0212 19:44:48.258369 2118 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:44:48.257000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f50900 a1=c000f6c870 a2=c0006a0720 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.257000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:48.258736 kubelet[2118]: I0212 19:44:48.258723 2118 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:44:48.258902 kubelet[2118]: I0212 19:44:48.258888 2118 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:44:48.259207 kubelet[2118]: I0212 19:44:48.259186 2118 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:44:48.262000 audit[2129]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.263614 kubelet[2118]: I0212 19:44:48.263245 2118 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:44:48.263614 kubelet[2118]: I0212 19:44:48.263363 2118 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:44:48.263614 kubelet[2118]: I0212 19:44:48.263416 2118 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:44:48.262000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1e04cb70 a2=0 a3=7ffc1e04cb5c items=0 ppid=2118 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.263949 kubelet[2118]: W0212 19:44:48.263779 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.263949 kubelet[2118]: E0212 19:44:48.263820 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:44:48.264304 kubelet[2118]: E0212 19:44:48.264265 2118 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-3bedefc55b?timeout=10s\": dial tcp 10.200.8.36:6443: connect: connection refused" interval="200ms" Feb 12 19:44:48.265000 audit[2130]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.265000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe10b6030 a2=0 a3=7fffe10b601c items=0 ppid=2118 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:44:48.268000 audit[2132]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.268000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff10bdab40 a2=0 a3=7fff10bdab2c items=0 ppid=2118 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:44:48.270000 audit[2134]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.270000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc2ec12d30 a2=0 a3=7ffc2ec12d1c items=0 ppid=2118 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:44:48.311000 audit[2139]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.311000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffebfd2fb00 a2=0 a3=7ffebfd2faec items=0 ppid=2118 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:44:48.312789 kubelet[2118]: I0212 19:44:48.312768 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:44:48.313000 audit[2141]: NETFILTER_CFG table=mangle:35 family=10 entries=2 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:44:48.313000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec121bf90 a2=0 a3=7ffec121bf7c items=0 ppid=2118 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:44:48.315000 audit[2142]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.315000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeca2d2b40 a2=0 a3=7ffeca2d2b2c items=0 ppid=2118 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:44:48.316614 kubelet[2118]: I0212 19:44:48.316599 2118 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:44:48.316790 kubelet[2118]: I0212 19:44:48.316777 2118 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:44:48.316915 kubelet[2118]: I0212 19:44:48.316900 2118 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:44:48.317035 kubelet[2118]: E0212 19:44:48.317025 2118 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:44:48.317677 kubelet[2118]: W0212 19:44:48.317651 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.317750 kubelet[2118]: E0212 19:44:48.317688 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:48.318018 kubelet[2118]: I0212 19:44:48.316648 2118 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:44:48.318018 kubelet[2118]: I0212 19:44:48.317831 2118 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:44:48.318018 kubelet[2118]: I0212 19:44:48.317849 2118 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:44:48.317000 audit[2144]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.317000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb4a09530 a2=0 a3=7ffeb4a0951c items=0 ppid=2118 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:44:48.319000 audit[2146]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:44:48.319000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6126c680 a2=0 a3=7ffe6126c66c items=0 ppid=2118 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:44:48.319000 audit[2145]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:44:48.319000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc39dbecb0 a2=0 a3=7ffc39dbec9c items=0 ppid=2118 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:44:48.320000 audit[2147]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:44:48.320000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd9abfc480 a2=0 a3=7ffd9abfc46c items=0 ppid=2118 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:44:48.321000 audit[2148]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:44:48.321000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0f731400 a2=0 a3=7fff0f7313ec items=0 ppid=2118 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:44:48.324194 kubelet[2118]: I0212 19:44:48.324175 2118 policy_none.go:49] "None policy: Start" Feb 12 19:44:48.324697 kubelet[2118]: I0212 19:44:48.324684 2118 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:44:48.324783 kubelet[2118]: I0212 19:44:48.324775 2118 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:44:48.334665 systemd[1]: Created slice kubepods.slice. Feb 12 19:44:48.339045 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:44:48.350786 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:44:48.352561 kubelet[2118]: I0212 19:44:48.352548 2118 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:44:48.352000 audit[2118]: AVC avc: denied { mac_admin } for pid=2118 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:48.352000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:48.352000 audit[2118]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000da16e0 a1=c001020270 a2=c000da16b0 a3=25 items=0 ppid=1 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:48.352000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:48.354244 kubelet[2118]: I0212 19:44:48.354232 2118 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:44:48.354506 kubelet[2118]: I0212 19:44:48.354494 2118 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:44:48.355326 kubelet[2118]: E0212 19:44:48.355134 2118 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-3bedefc55b\" not found" Feb 12 19:44:48.365487 kubelet[2118]: I0212 19:44:48.365465 2118 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.365757 kubelet[2118]: E0212 19:44:48.365739 2118 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.36:6443/api/v1/nodes\": dial tcp 10.200.8.36:6443: connect: connection refused" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.418071 kubelet[2118]: I0212 19:44:48.418046 2118 topology_manager.go:215] "Topology Admit Handler" podUID="ae8f952f9c96cf09a0139ade206ca576" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.419639 kubelet[2118]: I0212 19:44:48.419612 2118 topology_manager.go:215] "Topology Admit Handler" podUID="04f8df5d0cc80a414f38b6eab9272749" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.421849 kubelet[2118]: I0212 19:44:48.421831 2118 topology_manager.go:215] "Topology Admit Handler" podUID="f26a601d6756903b25d315c1c472d720" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.428556 systemd[1]: Created slice kubepods-burstable-podae8f952f9c96cf09a0139ade206ca576.slice. Feb 12 19:44:48.436836 systemd[1]: Created slice kubepods-burstable-pod04f8df5d0cc80a414f38b6eab9272749.slice. Feb 12 19:44:48.441358 systemd[1]: Created slice kubepods-burstable-podf26a601d6756903b25d315c1c472d720.slice. Feb 12 19:44:48.464839 kubelet[2118]: I0212 19:44:48.464815 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ae8f952f9c96cf09a0139ade206ca576-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-3bedefc55b\" (UID: \"ae8f952f9c96cf09a0139ade206ca576\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.464952 kubelet[2118]: I0212 19:44:48.464887 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.464952 kubelet[2118]: I0212 19:44:48.464925 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465048 kubelet[2118]: I0212 19:44:48.464964 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465048 kubelet[2118]: I0212 19:44:48.464996 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465048 kubelet[2118]: I0212 19:44:48.465023 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465163 kubelet[2118]: I0212 19:44:48.465060 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465163 kubelet[2118]: I0212 19:44:48.465101 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465163 kubelet[2118]: I0212 19:44:48.465143 2118 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.465565 kubelet[2118]: E0212 19:44:48.465535 2118 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-3bedefc55b?timeout=10s\": dial tcp 10.200.8.36:6443: connect: connection refused" interval="400ms" Feb 12 19:44:48.567955 kubelet[2118]: I0212 19:44:48.567842 2118 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.569376 kubelet[2118]: E0212 19:44:48.569358 2118 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.36:6443/api/v1/nodes\": dial tcp 10.200.8.36:6443: connect: connection refused" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.736498 env[1337]: time="2024-02-12T19:44:48.736427617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-3bedefc55b,Uid:ae8f952f9c96cf09a0139ade206ca576,Namespace:kube-system,Attempt:0,}" Feb 12 19:44:48.740141 env[1337]: time="2024-02-12T19:44:48.740096732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-3bedefc55b,Uid:04f8df5d0cc80a414f38b6eab9272749,Namespace:kube-system,Attempt:0,}" Feb 12 19:44:48.744705 env[1337]: time="2024-02-12T19:44:48.744671752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-3bedefc55b,Uid:f26a601d6756903b25d315c1c472d720,Namespace:kube-system,Attempt:0,}" Feb 12 19:44:48.866755 kubelet[2118]: E0212 19:44:48.866662 2118 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-3bedefc55b?timeout=10s\": dial tcp 10.200.8.36:6443: connect: connection refused" interval="800ms" Feb 12 19:44:48.971645 kubelet[2118]: I0212 19:44:48.971614 2118 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:48.972164 kubelet[2118]: E0212 19:44:48.972132 2118 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.36:6443/api/v1/nodes\": dial tcp 10.200.8.36:6443: connect: connection refused" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:49.219884 kubelet[2118]: W0212 19:44:49.219817 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.219884 kubelet[2118]: E0212 19:44:49.219880 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.269388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3902686665.mount: Deactivated successfully. Feb 12 19:44:49.308136 env[1337]: time="2024-02-12T19:44:49.308078228Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.311493 env[1337]: time="2024-02-12T19:44:49.311454442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.314095 kubelet[2118]: W0212 19:44:49.314052 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.314207 kubelet[2118]: E0212 19:44:49.314128 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.323363 env[1337]: time="2024-02-12T19:44:49.323330791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.327073 env[1337]: time="2024-02-12T19:44:49.327040507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.331042 env[1337]: time="2024-02-12T19:44:49.331006423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.343638 env[1337]: time="2024-02-12T19:44:49.343606476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.349015 env[1337]: time="2024-02-12T19:44:49.348980199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.353551 env[1337]: time="2024-02-12T19:44:49.353516217Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.358299 env[1337]: time="2024-02-12T19:44:49.358266237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.364495 env[1337]: time="2024-02-12T19:44:49.364466463Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.370431 env[1337]: time="2024-02-12T19:44:49.370397888Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.376199 env[1337]: time="2024-02-12T19:44:49.376162912Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:49.410538 kubelet[2118]: W0212 19:44:49.410081 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-3bedefc55b&limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.410727 kubelet[2118]: E0212 19:44:49.410701 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-3bedefc55b&limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.479341 env[1337]: time="2024-02-12T19:44:49.474467722Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:49.479341 env[1337]: time="2024-02-12T19:44:49.477434235Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:49.479341 env[1337]: time="2024-02-12T19:44:49.477466935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:49.479341 env[1337]: time="2024-02-12T19:44:49.477625236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5 pid=2158 runtime=io.containerd.runc.v2 Feb 12 19:44:49.482829 env[1337]: time="2024-02-12T19:44:49.482757357Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:49.482829 env[1337]: time="2024-02-12T19:44:49.482800057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:49.483033 env[1337]: time="2024-02-12T19:44:49.482813457Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:49.485464 env[1337]: time="2024-02-12T19:44:49.485395668Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6859fc16759f1291e1445e01208f41cd6e4fe3471a5a8c2deaef05233739ac2f pid=2169 runtime=io.containerd.runc.v2 Feb 12 19:44:49.490888 env[1337]: time="2024-02-12T19:44:49.490800391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:49.491068 env[1337]: time="2024-02-12T19:44:49.491020192Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:49.491203 env[1337]: time="2024-02-12T19:44:49.491174892Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:49.492020 env[1337]: time="2024-02-12T19:44:49.491977796Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b pid=2194 runtime=io.containerd.runc.v2 Feb 12 19:44:49.496483 systemd[1]: Started cri-containerd-899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5.scope. Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.516000 audit: BPF prog-id=62 op=LOAD Feb 12 19:44:49.517000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.517000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2158 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396364626466633337643537383261306361303730633661343263 Feb 12 19:44:49.517000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.517000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2158 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396364626466633337643537383261306361303730633661343263 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit: BPF prog-id=63 op=LOAD Feb 12 19:44:49.518000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388350 items=0 ppid=2158 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396364626466633337643537383261306361303730633661343263 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit: BPF prog-id=64 op=LOAD Feb 12 19:44:49.518000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000388398 items=0 ppid=2158 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396364626466633337643537383261306361303730633661343263 Feb 12 19:44:49.518000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:44:49.518000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.518000 audit: BPF prog-id=65 op=LOAD Feb 12 19:44:49.518000 audit[2177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003887a8 items=0 ppid=2158 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839396364626466633337643537383261306361303730633661343263 Feb 12 19:44:49.537649 systemd[1]: Started cri-containerd-2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b.scope. Feb 12 19:44:49.552766 systemd[1]: Started cri-containerd-6859fc16759f1291e1445e01208f41cd6e4fe3471a5a8c2deaef05233739ac2f.scope. Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.572000 audit: BPF prog-id=66 op=LOAD Feb 12 19:44:49.573000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.573000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2194 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353766613461386139336134623734613935393265646435303436 Feb 12 19:44:49.573000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.573000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2194 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353766613461386139336134623734613935393265646435303436 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.574000 audit: BPF prog-id=67 op=LOAD Feb 12 19:44:49.574000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a9060 items=0 ppid=2194 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353766613461386139336134623734613935393265646435303436 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.575000 audit: BPF prog-id=68 op=LOAD Feb 12 19:44:49.575000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a90a8 items=0 ppid=2194 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353766613461386139336134623734613935393265646435303436 Feb 12 19:44:49.576000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:44:49.576000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { perfmon } for pid=2212 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit[2212]: AVC avc: denied { bpf } for pid=2212 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.576000 audit: BPF prog-id=69 op=LOAD Feb 12 19:44:49.576000 audit[2212]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a94b8 items=0 ppid=2194 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234353766613461386139336134623734613935393265646435303436 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit: BPF prog-id=70 op=LOAD Feb 12 19:44:49.581000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.581000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2169 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353966633136373539663132393165313434356530313230386634 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2169 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353966633136373539663132393165313434356530313230386634 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit: BPF prog-id=71 op=LOAD Feb 12 19:44:49.582000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284e80 items=0 ppid=2169 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353966633136373539663132393165313434356530313230386634 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit: BPF prog-id=72 op=LOAD Feb 12 19:44:49.582000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284ec8 items=0 ppid=2169 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353966633136373539663132393165313434356530313230386634 Feb 12 19:44:49.582000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:44:49.582000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.582000 audit: BPF prog-id=73 op=LOAD Feb 12 19:44:49.582000 audit[2204]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002852d8 items=0 ppid=2169 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638353966633136373539663132393165313434356530313230386634 Feb 12 19:44:49.592051 env[1337]: time="2024-02-12T19:44:49.592011413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-3bedefc55b,Uid:ae8f952f9c96cf09a0139ade206ca576,Namespace:kube-system,Attempt:0,} returns sandbox id \"899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5\"" Feb 12 19:44:49.597078 env[1337]: time="2024-02-12T19:44:49.597048134Z" level=info msg="CreateContainer within sandbox \"899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:44:49.617766 env[1337]: time="2024-02-12T19:44:49.617237818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-3bedefc55b,Uid:04f8df5d0cc80a414f38b6eab9272749,Namespace:kube-system,Attempt:0,} returns sandbox id \"6859fc16759f1291e1445e01208f41cd6e4fe3471a5a8c2deaef05233739ac2f\"" Feb 12 19:44:49.617875 kubelet[2118]: W0212 19:44:49.617573 2118 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.617875 kubelet[2118]: E0212 19:44:49.617627 2118 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.36:6443: connect: connection refused Feb 12 19:44:49.623911 env[1337]: time="2024-02-12T19:44:49.623167343Z" level=info msg="CreateContainer within sandbox \"6859fc16759f1291e1445e01208f41cd6e4fe3471a5a8c2deaef05233739ac2f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:44:49.634442 env[1337]: time="2024-02-12T19:44:49.634406590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-3bedefc55b,Uid:f26a601d6756903b25d315c1c472d720,Namespace:kube-system,Attempt:0,} returns sandbox id \"2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b\"" Feb 12 19:44:49.636960 env[1337]: time="2024-02-12T19:44:49.636935301Z" level=info msg="CreateContainer within sandbox \"2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:44:49.661873 env[1337]: time="2024-02-12T19:44:49.661813305Z" level=info msg="CreateContainer within sandbox \"899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261\"" Feb 12 19:44:49.662477 env[1337]: time="2024-02-12T19:44:49.662444107Z" level=info msg="StartContainer for \"e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261\"" Feb 12 19:44:49.667190 kubelet[2118]: E0212 19:44:49.667163 2118 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-3bedefc55b?timeout=10s\": dial tcp 10.200.8.36:6443: connect: connection refused" interval="1.6s" Feb 12 19:44:49.679091 systemd[1]: Started cri-containerd-e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261.scope. Feb 12 19:44:49.691529 env[1337]: time="2024-02-12T19:44:49.691485928Z" level=info msg="CreateContainer within sandbox \"6859fc16759f1291e1445e01208f41cd6e4fe3471a5a8c2deaef05233739ac2f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9f62d1e27f64bffc6fff6c4dadd04d4898871e663a868da4a52d90ee5de2ef0c\"" Feb 12 19:44:49.692242 env[1337]: time="2024-02-12T19:44:49.692212531Z" level=info msg="StartContainer for \"9f62d1e27f64bffc6fff6c4dadd04d4898871e663a868da4a52d90ee5de2ef0c\"" Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.695000 audit: BPF prog-id=74 op=LOAD Feb 12 19:44:49.696000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.696000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2158 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623061663735333465333631613337303633646432303834353666 Feb 12 19:44:49.696000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.696000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2158 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623061663735333465333631613337303633646432303834353666 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit: BPF prog-id=75 op=LOAD Feb 12 19:44:49.697000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000388370 items=0 ppid=2158 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623061663735333465333631613337303633646432303834353666 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.697000 audit: BPF prog-id=76 op=LOAD Feb 12 19:44:49.697000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003883b8 items=0 ppid=2158 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623061663735333465333631613337303633646432303834353666 Feb 12 19:44:49.698000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:44:49.699000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.699000 audit: BPF prog-id=77 op=LOAD Feb 12 19:44:49.699000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003887c8 items=0 ppid=2158 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536623061663735333465333631613337303633646432303834353666 Feb 12 19:44:49.704668 env[1337]: time="2024-02-12T19:44:49.703448278Z" level=info msg="CreateContainer within sandbox \"2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507\"" Feb 12 19:44:49.705160 env[1337]: time="2024-02-12T19:44:49.705127185Z" level=info msg="StartContainer for \"23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507\"" Feb 12 19:44:49.723390 systemd[1]: Started cri-containerd-9f62d1e27f64bffc6fff6c4dadd04d4898871e663a868da4a52d90ee5de2ef0c.scope. Feb 12 19:44:49.730454 systemd[1]: Started cri-containerd-23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507.scope. Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.755000 audit: BPF prog-id=78 op=LOAD Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2169 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363264316532376636346266666336666666366334646164643034 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2169 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363264316532376636346266666336666666366334646164643034 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit: BPF prog-id=79 op=LOAD Feb 12 19:44:49.756000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000025680 items=0 ppid=2169 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363264316532376636346266666336666666366334646164643034 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit: BPF prog-id=80 op=LOAD Feb 12 19:44:49.756000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000256c8 items=0 ppid=2169 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363264316532376636346266666336666666366334646164643034 Feb 12 19:44:49.756000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:44:49.756000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.756000 audit: BPF prog-id=81 op=LOAD Feb 12 19:44:49.756000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000025ad8 items=0 ppid=2169 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363264316532376636346266666336666666366334646164643034 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit: BPF prog-id=82 op=LOAD Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2194 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616433663730666366643935666534623032313231363165383338 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2194 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616433663730666366643935666534623032313231363165383338 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit: BPF prog-id=83 op=LOAD Feb 12 19:44:49.766000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000353d00 items=0 ppid=2194 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616433663730666366643935666534623032313231363165383338 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit: BPF prog-id=84 op=LOAD Feb 12 19:44:49.766000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000353d48 items=0 ppid=2194 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616433663730666366643935666534623032313231363165383338 Feb 12 19:44:49.766000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:44:49.766000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { perfmon } for pid=2321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit[2321]: AVC avc: denied { bpf } for pid=2321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:49.766000 audit: BPF prog-id=85 op=LOAD Feb 12 19:44:49.766000 audit[2321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be158 items=0 ppid=2194 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:49.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616433663730666366643935666534623032313231363165383338 Feb 12 19:44:49.774668 kubelet[2118]: I0212 19:44:49.774201 2118 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:49.774668 kubelet[2118]: E0212 19:44:49.774605 2118 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.36:6443/api/v1/nodes\": dial tcp 10.200.8.36:6443: connect: connection refused" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:49.805094 env[1337]: time="2024-02-12T19:44:49.805052403Z" level=info msg="StartContainer for \"e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261\" returns successfully" Feb 12 19:44:49.827106 env[1337]: time="2024-02-12T19:44:49.827050494Z" level=info msg="StartContainer for \"9f62d1e27f64bffc6fff6c4dadd04d4898871e663a868da4a52d90ee5de2ef0c\" returns successfully" Feb 12 19:44:49.838067 env[1337]: time="2024-02-12T19:44:49.838026840Z" level=info msg="StartContainer for \"23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507\" returns successfully" Feb 12 19:44:51.376834 kubelet[2118]: I0212 19:44:51.376811 2118 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:51.654000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:51.660283 kernel: kauditd_printk_skb: 579 callbacks suppressed Feb 12 19:44:51.660373 kernel: audit: type=1400 audit(1707767091.654:680): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:51.654000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a70030 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:51.714900 kernel: audit: type=1300 audit(1707767091.654:680): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a70030 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:51.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:51.655000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:51.752908 kernel: audit: type=1327 audit(1707767091.654:680): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:51.753022 kernel: audit: type=1400 audit(1707767091.655:681): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:51.655000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001522a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:51.779368 kernel: audit: type=1300 audit(1707767091.655:681): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0001522a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:51.779486 kernel: audit: type=1327 audit(1707767091.655:681): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:51.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:52.114000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.155581 kernel: audit: type=1400 audit(1707767092.114:682): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.155730 kernel: audit: type=1300 audit(1707767092.114:682): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0073b2060 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.114000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0073b2060 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.114000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.176935 kernel: audit: type=1327 audit(1707767092.114:682): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.129000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.198476 kernel: audit: type=1400 audit(1707767092.129:683): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.129000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006a560c0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.129000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.129000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0073b22a0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.129000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.155000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.155000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c000e37620 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.155000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.218000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.218000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c003305a40 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.219000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:44:52.219000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0047ec8d0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:44:52.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:44:52.274371 kubelet[2118]: E0212 19:44:52.274334 2118 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-3bedefc55b\" not found" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:52.360083 kubelet[2118]: I0212 19:44:52.360045 2118 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:52.411372 kubelet[2118]: E0212 19:44:52.411237 2118 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-3bedefc55b\" not found" Feb 12 19:44:52.725087 kubelet[2118]: E0212 19:44:52.724976 2118 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:53.251125 kubelet[2118]: I0212 19:44:53.251090 2118 apiserver.go:52] "Watching apiserver" Feb 12 19:44:53.264028 kubelet[2118]: I0212 19:44:53.263992 2118 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:44:56.376667 kubelet[2118]: W0212 19:44:56.376629 2118 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:44:57.078575 systemd[1]: Reloading. Feb 12 19:44:57.166156 /usr/lib/systemd/system-generators/torcx-generator[2404]: time="2024-02-12T19:44:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:44:57.166196 /usr/lib/systemd/system-generators/torcx-generator[2404]: time="2024-02-12T19:44:57Z" level=info msg="torcx already run" Feb 12 19:44:57.198000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:44:57.208615 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:44:57.208711 kernel: audit: type=1400 audit(1707767097.198:688): avc: denied { watch } for pid=2340 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:44:57.198000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009491c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:57.198000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:57.266160 kernel: audit: type=1300 audit(1707767097.198:688): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009491c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:44:57.266255 kernel: audit: type=1327 audit(1707767097.198:688): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:44:57.298619 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:44:57.298638 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:44:57.316971 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413524 kernel: audit: type=1400 audit(1707767097.397:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.434968 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:44:57.435050 kernel: audit: type=1400 audit(1707767097.397:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.435079 kernel: audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.450424 kernel: audit: type=1400 audit(1707767097.397:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.450496 kernel: audit: backlog limit exceeded Feb 12 19:44:57.450525 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit: BPF prog-id=86 op=LOAD Feb 12 19:44:57.411000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit: BPF prog-id=87 op=LOAD Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.411000 audit: BPF prog-id=88 op=LOAD Feb 12 19:44:57.411000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:44:57.411000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit: BPF prog-id=89 op=LOAD Feb 12 19:44:57.412000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.412000 audit: BPF prog-id=90 op=LOAD Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.413000 audit: BPF prog-id=91 op=LOAD Feb 12 19:44:57.413000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:44:57.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.459000 audit: BPF prog-id=92 op=LOAD Feb 12 19:44:57.459000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.462000 audit: BPF prog-id=93 op=LOAD Feb 12 19:44:57.462000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.464000 audit: BPF prog-id=94 op=LOAD Feb 12 19:44:57.464000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit: BPF prog-id=95 op=LOAD Feb 12 19:44:57.465000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit: BPF prog-id=96 op=LOAD Feb 12 19:44:57.466000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.466000 audit: BPF prog-id=97 op=LOAD Feb 12 19:44:57.466000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit: BPF prog-id=98 op=LOAD Feb 12 19:44:57.468000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit: BPF prog-id=99 op=LOAD Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.468000 audit: BPF prog-id=100 op=LOAD Feb 12 19:44:57.468000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:44:57.468000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit: BPF prog-id=101 op=LOAD Feb 12 19:44:57.470000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit: BPF prog-id=102 op=LOAD Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.470000 audit: BPF prog-id=103 op=LOAD Feb 12 19:44:57.470000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:44:57.470000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.472000 audit: BPF prog-id=104 op=LOAD Feb 12 19:44:57.472000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.473000 audit: BPF prog-id=105 op=LOAD Feb 12 19:44:57.473000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.474000 audit: BPF prog-id=106 op=LOAD Feb 12 19:44:57.475000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:44:57.491277 kubelet[2118]: I0212 19:44:57.490847 2118 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:44:57.491046 systemd[1]: Stopping kubelet.service... Feb 12 19:44:57.515158 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:44:57.515465 systemd[1]: Stopped kubelet.service. Feb 12 19:44:57.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:57.517566 systemd[1]: Started kubelet.service. Feb 12 19:44:57.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:44:57.592448 kubelet[2467]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:44:57.592782 kubelet[2467]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:44:57.592825 kubelet[2467]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:44:57.592958 kubelet[2467]: I0212 19:44:57.592926 2467 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:44:57.605242 kubelet[2467]: I0212 19:44:57.605218 2467 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:44:57.605382 kubelet[2467]: I0212 19:44:57.605374 2467 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:44:57.605606 kubelet[2467]: I0212 19:44:57.605593 2467 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:44:57.607118 kubelet[2467]: I0212 19:44:57.607100 2467 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:44:57.608203 kubelet[2467]: I0212 19:44:57.608178 2467 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:44:57.614133 kubelet[2467]: I0212 19:44:57.614116 2467 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:44:57.614435 kubelet[2467]: I0212 19:44:57.614422 2467 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:44:57.614684 kubelet[2467]: I0212 19:44:57.614671 2467 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:44:57.614814 kubelet[2467]: I0212 19:44:57.614806 2467 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:44:57.614859 kubelet[2467]: I0212 19:44:57.614853 2467 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:44:57.614954 kubelet[2467]: I0212 19:44:57.614940 2467 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:44:57.615108 kubelet[2467]: I0212 19:44:57.615074 2467 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:44:57.615108 kubelet[2467]: I0212 19:44:57.615099 2467 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:44:57.615960 kubelet[2467]: I0212 19:44:57.615942 2467 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:44:57.616112 kubelet[2467]: I0212 19:44:57.616103 2467 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:44:57.623367 kubelet[2467]: I0212 19:44:57.623352 2467 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:44:57.631352 kubelet[2467]: I0212 19:44:57.631321 2467 server.go:1232] "Started kubelet" Feb 12 19:44:57.632000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.632000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:57.632000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c60c90 a1=c000c26ba0 a2=c000c60c60 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:57.632000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:57.633572 kubelet[2467]: I0212 19:44:57.633287 2467 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:44:57.633572 kubelet[2467]: I0212 19:44:57.633324 2467 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:44:57.633572 kubelet[2467]: I0212 19:44:57.633352 2467 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:44:57.632000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.632000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:57.632000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c1f3e0 a1=c000c26bb8 a2=c000c60d20 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:57.632000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:57.636591 kubelet[2467]: I0212 19:44:57.636565 2467 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:44:57.637893 kubelet[2467]: I0212 19:44:57.637450 2467 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:44:57.638542 kubelet[2467]: I0212 19:44:57.638497 2467 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:44:57.640193 kubelet[2467]: I0212 19:44:57.639596 2467 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:44:57.640193 kubelet[2467]: I0212 19:44:57.639943 2467 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:44:57.643844 kubelet[2467]: I0212 19:44:57.643817 2467 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:44:57.644056 kubelet[2467]: I0212 19:44:57.644039 2467 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:44:57.645084 kubelet[2467]: E0212 19:44:57.644608 2467 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:44:57.645084 kubelet[2467]: E0212 19:44:57.644633 2467 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:44:57.662915 kubelet[2467]: I0212 19:44:57.662429 2467 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:44:57.664169 kubelet[2467]: I0212 19:44:57.664153 2467 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:44:57.664282 kubelet[2467]: I0212 19:44:57.664270 2467 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:44:57.664369 kubelet[2467]: I0212 19:44:57.664361 2467 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:44:57.664482 kubelet[2467]: E0212 19:44:57.664473 2467 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:44:57.715745 kubelet[2467]: I0212 19:44:57.715723 2467 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:44:57.715943 kubelet[2467]: I0212 19:44:57.715934 2467 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:44:57.716022 kubelet[2467]: I0212 19:44:57.716015 2467 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:44:57.716252 kubelet[2467]: I0212 19:44:57.716237 2467 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:44:57.716358 kubelet[2467]: I0212 19:44:57.716349 2467 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 12 19:44:57.716408 kubelet[2467]: I0212 19:44:57.716403 2467 policy_none.go:49] "None policy: Start" Feb 12 19:44:57.717151 kubelet[2467]: I0212 19:44:57.717122 2467 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:44:57.717151 kubelet[2467]: I0212 19:44:57.717145 2467 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:44:57.717350 kubelet[2467]: I0212 19:44:57.717318 2467 state_mem.go:75] "Updated machine memory state" Feb 12 19:44:57.720993 kubelet[2467]: I0212 19:44:57.720980 2467 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:44:57.720000 audit[2467]: AVC avc: denied { mac_admin } for pid=2467 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:57.720000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:44:57.720000 audit[2467]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001254180 a1=c00124e8b8 a2=c001254150 a3=25 items=0 ppid=1 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:57.720000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:44:57.721574 kubelet[2467]: I0212 19:44:57.721313 2467 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:44:57.721574 kubelet[2467]: I0212 19:44:57.721505 2467 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:44:57.741083 kubelet[2467]: I0212 19:44:57.741058 2467 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.756036 kubelet[2467]: I0212 19:44:57.756001 2467 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.756135 kubelet[2467]: I0212 19:44:57.756066 2467 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.764826 kubelet[2467]: I0212 19:44:57.764800 2467 topology_manager.go:215] "Topology Admit Handler" podUID="f26a601d6756903b25d315c1c472d720" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.764944 kubelet[2467]: I0212 19:44:57.764925 2467 topology_manager.go:215] "Topology Admit Handler" podUID="ae8f952f9c96cf09a0139ade206ca576" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.766007 kubelet[2467]: I0212 19:44:57.765988 2467 topology_manager.go:215] "Topology Admit Handler" podUID="04f8df5d0cc80a414f38b6eab9272749" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.772659 kubelet[2467]: W0212 19:44:57.772198 2467 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:44:57.775533 kubelet[2467]: W0212 19:44:57.775517 2467 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:44:57.782983 kubelet[2467]: W0212 19:44:57.782960 2467 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:44:57.783062 kubelet[2467]: E0212 19:44:57.783015 2467 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-3bedefc55b\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941174 kubelet[2467]: I0212 19:44:57.940962 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941174 kubelet[2467]: I0212 19:44:57.941103 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ae8f952f9c96cf09a0139ade206ca576-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-3bedefc55b\" (UID: \"ae8f952f9c96cf09a0139ade206ca576\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941581 kubelet[2467]: I0212 19:44:57.941205 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941581 kubelet[2467]: I0212 19:44:57.941284 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941581 kubelet[2467]: I0212 19:44:57.941365 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941581 kubelet[2467]: I0212 19:44:57.941444 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941581 kubelet[2467]: I0212 19:44:57.941526 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04f8df5d0cc80a414f38b6eab9272749-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-3bedefc55b\" (UID: \"04f8df5d0cc80a414f38b6eab9272749\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941840 kubelet[2467]: I0212 19:44:57.941579 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:57.941840 kubelet[2467]: I0212 19:44:57.941621 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f26a601d6756903b25d315c1c472d720-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" (UID: \"f26a601d6756903b25d315c1c472d720\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:58.623808 kubelet[2467]: I0212 19:44:58.623756 2467 apiserver.go:52] "Watching apiserver" Feb 12 19:44:58.640119 kubelet[2467]: I0212 19:44:58.640087 2467 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:44:58.703198 kubelet[2467]: W0212 19:44:58.703167 2467 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:44:58.703380 kubelet[2467]: E0212 19:44:58.703242 2467 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-3bedefc55b\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" Feb 12 19:44:58.720562 kubelet[2467]: I0212 19:44:58.720531 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-3bedefc55b" podStartSLOduration=2.720489398 podCreationTimestamp="2024-02-12 19:44:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:44:58.711471466 +0000 UTC m=+1.183218374" watchObservedRunningTime="2024-02-12 19:44:58.720489398 +0000 UTC m=+1.192236306" Feb 12 19:44:58.720822 kubelet[2467]: I0212 19:44:58.720808 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-3bedefc55b" podStartSLOduration=1.7207783989999998 podCreationTimestamp="2024-02-12 19:44:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:44:58.720300197 +0000 UTC m=+1.192047105" watchObservedRunningTime="2024-02-12 19:44:58.720778399 +0000 UTC m=+1.192525407" Feb 12 19:44:58.728023 kubelet[2467]: I0212 19:44:58.727998 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" podStartSLOduration=1.727966624 podCreationTimestamp="2024-02-12 19:44:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:44:58.727954124 +0000 UTC m=+1.199701032" watchObservedRunningTime="2024-02-12 19:44:58.727966624 +0000 UTC m=+1.199713632" Feb 12 19:45:00.651000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:00.651000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011b00a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:00.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:00.655000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:00.655000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011b01e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:00.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:00.659000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:00.659000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:00.659000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000249c80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:00.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:00.659000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011b0300 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:00.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:04.223087 sudo[1705]: pam_unix(sudo:session): session closed for user root Feb 12 19:45:04.222000 audit[1705]: USER_END pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:45:04.228156 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 12 19:45:04.228225 kernel: audit: type=1106 audit(1707767104.222:940): pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:45:04.222000 audit[1705]: CRED_DISP pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:45:04.258466 kernel: audit: type=1104 audit(1707767104.222:941): pid=1705 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:45:04.326227 sshd[1702]: pam_unix(sshd:session): session closed for user core Feb 12 19:45:04.326000 audit[1702]: USER_END pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:45:04.329935 systemd[1]: sshd@6-10.200.8.36:22-10.200.12.6:40690.service: Deactivated successfully. Feb 12 19:45:04.330803 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:45:04.331007 systemd[1]: session-9.scope: Consumed 4.568s CPU time. Feb 12 19:45:04.332478 systemd-logind[1325]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:45:04.333546 systemd-logind[1325]: Removed session 9. Feb 12 19:45:04.346889 kernel: audit: type=1106 audit(1707767104.326:942): pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:45:04.346968 kernel: audit: type=1104 audit(1707767104.326:943): pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:45:04.326000 audit[1702]: CRED_DISP pid=1702 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:45:04.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.36:22-10.200.12.6:40690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:04.378713 kernel: audit: type=1131 audit(1707767104.329:944): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.36:22-10.200.12.6:40690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:10.955485 kubelet[2467]: I0212 19:45:10.955437 2467 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:45:10.956047 env[1337]: time="2024-02-12T19:45:10.955935513Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:45:10.956422 kubelet[2467]: I0212 19:45:10.956172 2467 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:45:11.018427 kubelet[2467]: I0212 19:45:11.018391 2467 topology_manager.go:215] "Topology Admit Handler" podUID="020fa9d3-429f-4c20-804d-5ccb1b201a64" podNamespace="kube-system" podName="kube-proxy-99ph2" Feb 12 19:45:11.024285 systemd[1]: Created slice kubepods-besteffort-pod020fa9d3_429f_4c20_804d_5ccb1b201a64.slice. Feb 12 19:45:11.026900 kubelet[2467]: I0212 19:45:11.026680 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/020fa9d3-429f-4c20-804d-5ccb1b201a64-kube-proxy\") pod \"kube-proxy-99ph2\" (UID: \"020fa9d3-429f-4c20-804d-5ccb1b201a64\") " pod="kube-system/kube-proxy-99ph2" Feb 12 19:45:11.026900 kubelet[2467]: I0212 19:45:11.026726 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/020fa9d3-429f-4c20-804d-5ccb1b201a64-lib-modules\") pod \"kube-proxy-99ph2\" (UID: \"020fa9d3-429f-4c20-804d-5ccb1b201a64\") " pod="kube-system/kube-proxy-99ph2" Feb 12 19:45:11.026900 kubelet[2467]: I0212 19:45:11.026770 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/020fa9d3-429f-4c20-804d-5ccb1b201a64-xtables-lock\") pod \"kube-proxy-99ph2\" (UID: \"020fa9d3-429f-4c20-804d-5ccb1b201a64\") " pod="kube-system/kube-proxy-99ph2" Feb 12 19:45:11.026900 kubelet[2467]: I0212 19:45:11.026803 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b6zzj\" (UniqueName: \"kubernetes.io/projected/020fa9d3-429f-4c20-804d-5ccb1b201a64-kube-api-access-b6zzj\") pod \"kube-proxy-99ph2\" (UID: \"020fa9d3-429f-4c20-804d-5ccb1b201a64\") " pod="kube-system/kube-proxy-99ph2" Feb 12 19:45:11.169194 kubelet[2467]: E0212 19:45:11.169159 2467 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Feb 12 19:45:11.169387 kubelet[2467]: E0212 19:45:11.169373 2467 projected.go:198] Error preparing data for projected volume kube-api-access-b6zzj for pod kube-system/kube-proxy-99ph2: configmap "kube-root-ca.crt" not found Feb 12 19:45:11.169573 kubelet[2467]: E0212 19:45:11.169558 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/020fa9d3-429f-4c20-804d-5ccb1b201a64-kube-api-access-b6zzj podName:020fa9d3-429f-4c20-804d-5ccb1b201a64 nodeName:}" failed. No retries permitted until 2024-02-12 19:45:11.669513215 +0000 UTC m=+14.141260123 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-b6zzj" (UniqueName: "kubernetes.io/projected/020fa9d3-429f-4c20-804d-5ccb1b201a64-kube-api-access-b6zzj") pod "kube-proxy-99ph2" (UID: "020fa9d3-429f-4c20-804d-5ccb1b201a64") : configmap "kube-root-ca.crt" not found Feb 12 19:45:11.405190 kubelet[2467]: I0212 19:45:11.405150 2467 topology_manager.go:215] "Topology Admit Handler" podUID="77789baa-74bc-43d2-8543-18bdc0e13259" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-8zknm" Feb 12 19:45:11.412678 systemd[1]: Created slice kubepods-besteffort-pod77789baa_74bc_43d2_8543_18bdc0e13259.slice. Feb 12 19:45:11.417502 kubelet[2467]: W0212 19:45:11.417472 2467 reflector.go:535] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:45:11.417642 kubelet[2467]: W0212 19:45:11.417621 2467 reflector.go:535] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:45:11.417708 kubelet[2467]: E0212 19:45:11.417652 2467 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:45:11.417708 kubelet[2467]: E0212 19:45:11.417624 2467 reflector.go:147] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:45:11.429676 kubelet[2467]: I0212 19:45:11.429646 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w85t2\" (UniqueName: \"kubernetes.io/projected/77789baa-74bc-43d2-8543-18bdc0e13259-kube-api-access-w85t2\") pod \"tigera-operator-55585899bf-8zknm\" (UID: \"77789baa-74bc-43d2-8543-18bdc0e13259\") " pod="tigera-operator/tigera-operator-55585899bf-8zknm" Feb 12 19:45:11.429776 kubelet[2467]: I0212 19:45:11.429735 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/77789baa-74bc-43d2-8543-18bdc0e13259-var-lib-calico\") pod \"tigera-operator-55585899bf-8zknm\" (UID: \"77789baa-74bc-43d2-8543-18bdc0e13259\") " pod="tigera-operator/tigera-operator-55585899bf-8zknm" Feb 12 19:45:11.932068 env[1337]: time="2024-02-12T19:45:11.932005858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-99ph2,Uid:020fa9d3-429f-4c20-804d-5ccb1b201a64,Namespace:kube-system,Attempt:0,}" Feb 12 19:45:11.969612 env[1337]: time="2024-02-12T19:45:11.969378063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:11.969612 env[1337]: time="2024-02-12T19:45:11.969436064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:11.969612 env[1337]: time="2024-02-12T19:45:11.969453564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:11.970154 env[1337]: time="2024-02-12T19:45:11.970097865Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39f65b7c93084735f52bb15b81f4bc9b485906933445fcbd60f31ff91d3fb35a pid=2561 runtime=io.containerd.runc.v2 Feb 12 19:45:11.999648 systemd[1]: Started cri-containerd-39f65b7c93084735f52bb15b81f4bc9b485906933445fcbd60f31ff91d3fb35a.scope. Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.042693 kernel: audit: type=1400 audit(1707767112.013:945): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.042777 kernel: audit: type=1400 audit(1707767112.013:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.042800 kernel: audit: type=1400 audit(1707767112.013:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.109428 kernel: audit: type=1400 audit(1707767112.013:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.109542 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:45:12.109569 kernel: audit: type=1400 audit(1707767112.013:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.109599 kernel: audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:45:12.109619 kernel: audit: type=1400 audit(1707767112.013:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.109639 kernel: audit: backlog limit exceeded Feb 12 19:45:12.109657 kernel: audit: type=1400 audit(1707767112.013:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.013000 audit: BPF prog-id=107 op=LOAD Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.017000 audit: BPF prog-id=108 op=LOAD Feb 12 19:45:12.017000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000290360 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.028000 audit: BPF prog-id=109 op=LOAD Feb 12 19:45:12.028000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002903a8 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.054000 audit: BPF prog-id=109 op=UNLOAD Feb 12 19:45:12.055000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c0001bdc30 a2=78 a3=c0002907b8 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { perfmon } for pid=2572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: AVC avc: denied { bpf } for pid=2572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.055000 audit[2572]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002907b8 items=0 ppid=2561 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663635623763393330383437333566353262623135623831663462 Feb 12 19:45:12.137359 env[1337]: time="2024-02-12T19:45:12.137318830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-99ph2,Uid:020fa9d3-429f-4c20-804d-5ccb1b201a64,Namespace:kube-system,Attempt:0,} returns sandbox id \"39f65b7c93084735f52bb15b81f4bc9b485906933445fcbd60f31ff91d3fb35a\"" Feb 12 19:45:12.141550 env[1337]: time="2024-02-12T19:45:12.141512741Z" level=info msg="CreateContainer within sandbox \"39f65b7c93084735f52bb15b81f4bc9b485906933445fcbd60f31ff91d3fb35a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:45:12.192784 env[1337]: time="2024-02-12T19:45:12.191103379Z" level=info msg="CreateContainer within sandbox \"39f65b7c93084735f52bb15b81f4bc9b485906933445fcbd60f31ff91d3fb35a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fb454dd895620773de479056dfa386a85bae9ca75cb18ae9575a6f096f78d8ad\"" Feb 12 19:45:12.193379 env[1337]: time="2024-02-12T19:45:12.193348485Z" level=info msg="StartContainer for \"fb454dd895620773de479056dfa386a85bae9ca75cb18ae9575a6f096f78d8ad\"" Feb 12 19:45:12.211023 systemd[1]: Started cri-containerd-fb454dd895620773de479056dfa386a85bae9ca75cb18ae9575a6f096f78d8ad.scope. Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fedbc6ebb48 items=0 ppid=2561 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343534646438393536323037373364653437393035366466613338 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit: BPF prog-id=111 op=LOAD Feb 12 19:45:12.231000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a2898 items=0 ppid=2561 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343534646438393536323037373364653437393035366466613338 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit: BPF prog-id=112 op=LOAD Feb 12 19:45:12.231000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a28e8 items=0 ppid=2561 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343534646438393536323037373364653437393035366466613338 Feb 12 19:45:12.231000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:45:12.231000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:12.231000 audit: BPF prog-id=113 op=LOAD Feb 12 19:45:12.231000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a2978 items=0 ppid=2561 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343534646438393536323037373364653437393035366466613338 Feb 12 19:45:12.251267 env[1337]: time="2024-02-12T19:45:12.251217645Z" level=info msg="StartContainer for \"fb454dd895620773de479056dfa386a85bae9ca75cb18ae9575a6f096f78d8ad\" returns successfully" Feb 12 19:45:12.304000 audit[2659]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.304000 audit[2659]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfe7dc700 a2=0 a3=7ffdfe7dc6ec items=0 ppid=2616 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:45:12.309000 audit[2661]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.309000 audit[2661]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3d4aa9a0 a2=0 a3=7fff3d4aa98c items=0 ppid=2616 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.309000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:45:12.310000 audit[2662]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.310000 audit[2662]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecd1648d0 a2=0 a3=7ffecd1648bc items=0 ppid=2616 pid=2662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:45:12.311000 audit[2660]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.311000 audit[2660]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7b9279f0 a2=0 a3=31030 items=0 ppid=2616 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:45:12.312000 audit[2663]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.312000 audit[2663]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf3a80a90 a2=0 a3=7ffcf3a80a7c items=0 ppid=2616 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:45:12.314000 audit[2664]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.314000 audit[2664]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff10729490 a2=0 a3=7fff1072947c items=0 ppid=2616 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:45:12.408000 audit[2665]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.408000 audit[2665]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdacb1dc20 a2=0 a3=7ffdacb1dc0c items=0 ppid=2616 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:45:12.411000 audit[2667]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.411000 audit[2667]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb36f52d0 a2=0 a3=7ffeb36f52bc items=0 ppid=2616 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:45:12.415000 audit[2670]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.415000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff03511cd0 a2=0 a3=7fff03511cbc items=0 ppid=2616 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:45:12.416000 audit[2671]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.416000 audit[2671]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe887b0e0 a2=0 a3=7fffe887b0cc items=0 ppid=2616 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:45:12.418000 audit[2673]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.418000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff20fad210 a2=0 a3=7fff20fad1fc items=0 ppid=2616 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:45:12.420000 audit[2674]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.420000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3dfd00e0 a2=0 a3=7ffe3dfd00cc items=0 ppid=2616 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:45:12.423000 audit[2676]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.423000 audit[2676]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd1201ac00 a2=0 a3=7ffd1201abec items=0 ppid=2616 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:45:12.427000 audit[2679]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.427000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff33394f30 a2=0 a3=7fff33394f1c items=0 ppid=2616 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:45:12.428000 audit[2680]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.428000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc0322b50 a2=0 a3=7ffcc0322b3c items=0 ppid=2616 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:45:12.431000 audit[2682]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.431000 audit[2682]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd06827f00 a2=0 a3=7ffd06827eec items=0 ppid=2616 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:45:12.432000 audit[2683]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.432000 audit[2683]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc58ab7fe0 a2=0 a3=7ffc58ab7fcc items=0 ppid=2616 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:45:12.436000 audit[2685]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.436000 audit[2685]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2b87cd30 a2=0 a3=7ffd2b87cd1c items=0 ppid=2616 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:45:12.439000 audit[2688]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.439000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc435bc570 a2=0 a3=7ffc435bc55c items=0 ppid=2616 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:45:12.443000 audit[2691]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.443000 audit[2691]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff126b0610 a2=0 a3=7fff126b05fc items=0 ppid=2616 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:45:12.446000 audit[2692]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.446000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffecf542140 a2=0 a3=7ffecf54212c items=0 ppid=2616 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:45:12.449000 audit[2694]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.449000 audit[2694]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdec170660 a2=0 a3=7ffdec17064c items=0 ppid=2616 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:45:12.452000 audit[2697]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.452000 audit[2697]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe8ab5b310 a2=0 a3=7ffe8ab5b2fc items=0 ppid=2616 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:45:12.453000 audit[2698]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.453000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2eedd1f0 a2=0 a3=7ffc2eedd1dc items=0 ppid=2616 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:45:12.456000 audit[2700]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:45:12.456000 audit[2700]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffca1b55360 a2=0 a3=7ffca1b5534c items=0 ppid=2616 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:45:12.507000 audit[2706]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:12.507000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffbaf668d0 a2=0 a3=7fffbaf668bc items=0 ppid=2616 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:12.529000 audit[2706]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:12.529000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffbaf668d0 a2=0 a3=7fffbaf668bc items=0 ppid=2616 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:12.531000 audit[2711]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.531000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd29321610 a2=0 a3=7ffd293215fc items=0 ppid=2616 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:45:12.534000 audit[2713]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.534000 audit[2713]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd6ee06e70 a2=0 a3=7ffd6ee06e5c items=0 ppid=2616 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:45:12.539000 audit[2716]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.539000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd2eb6b660 a2=0 a3=7ffd2eb6b64c items=0 ppid=2616 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:45:12.540000 audit[2717]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.540000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd235f600 a2=0 a3=7ffcd235f5ec items=0 ppid=2616 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:45:12.543000 audit[2719]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.543000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffecd419dd0 a2=0 a3=7ffecd419dbc items=0 ppid=2616 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:45:12.544000 audit[2720]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.544000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce5aafe60 a2=0 a3=7ffce5aafe4c items=0 ppid=2616 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:45:12.547000 audit[2722]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.547000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1941cb90 a2=0 a3=7fff1941cb7c items=0 ppid=2616 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:45:12.550000 audit[2725]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.550000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc271670f0 a2=0 a3=7ffc271670dc items=0 ppid=2616 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:45:12.551000 audit[2726]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.551000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd005c5260 a2=0 a3=7ffd005c524c items=0 ppid=2616 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:45:12.554000 audit[2728]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.554000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd25904c00 a2=0 a3=7ffd25904bec items=0 ppid=2616 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.554000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:45:12.555000 audit[2729]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.555000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc193ac4a0 a2=0 a3=7ffc193ac48c items=0 ppid=2616 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:45:12.557000 audit[2731]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.557000 audit[2731]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc155f6650 a2=0 a3=7ffc155f663c items=0 ppid=2616 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:45:12.561000 audit[2734]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.561000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe70e5f230 a2=0 a3=7ffe70e5f21c items=0 ppid=2616 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:45:12.564000 audit[2737]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.564000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5fe44a40 a2=0 a3=7ffc5fe44a2c items=0 ppid=2616 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:45:12.565000 audit[2738]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.565000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc5a5e8920 a2=0 a3=7ffc5a5e890c items=0 ppid=2616 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:45:12.568000 audit[2740]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.568000 audit[2740]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffceb834770 a2=0 a3=7ffceb83475c items=0 ppid=2616 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:45:12.571000 audit[2743]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.571000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe82eaf5d0 a2=0 a3=7ffe82eaf5bc items=0 ppid=2616 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:45:12.572000 audit[2744]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.572000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc29585090 a2=0 a3=7ffc2958507c items=0 ppid=2616 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:45:12.574000 audit[2746]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.574000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffffcd98f50 a2=0 a3=7ffffcd98f3c items=0 ppid=2616 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:45:12.575000 audit[2747]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.575000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd48132250 a2=0 a3=7ffd4813223c items=0 ppid=2616 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:45:12.578000 audit[2749]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.578000 audit[2749]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9381fd00 a2=0 a3=7ffc9381fcec items=0 ppid=2616 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:45:12.581000 audit[2752]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:45:12.581000 audit[2752]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb1e55ce0 a2=0 a3=7ffeb1e55ccc items=0 ppid=2616 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:45:12.584000 audit[2754]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:45:12.584000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc5df26360 a2=0 a3=7ffc5df2634c items=0 ppid=2616 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.584000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:12.585000 audit[2754]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:45:12.585000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc5df26360 a2=0 a3=7ffc5df2634c items=0 ppid=2616 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:12.585000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:12.609656 kubelet[2467]: E0212 19:45:12.609620 2467 projected.go:292] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:45:12.609656 kubelet[2467]: E0212 19:45:12.609657 2467 projected.go:198] Error preparing data for projected volume kube-api-access-w85t2 for pod tigera-operator/tigera-operator-55585899bf-8zknm: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:45:12.610167 kubelet[2467]: E0212 19:45:12.609734 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/77789baa-74bc-43d2-8543-18bdc0e13259-kube-api-access-w85t2 podName:77789baa-74bc-43d2-8543-18bdc0e13259 nodeName:}" failed. No retries permitted until 2024-02-12 19:45:13.109712438 +0000 UTC m=+15.581459446 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-w85t2" (UniqueName: "kubernetes.io/projected/77789baa-74bc-43d2-8543-18bdc0e13259-kube-api-access-w85t2") pod "tigera-operator-55585899bf-8zknm" (UID: "77789baa-74bc-43d2-8543-18bdc0e13259") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:45:12.723260 kubelet[2467]: I0212 19:45:12.723140 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-99ph2" podStartSLOduration=2.723084951 podCreationTimestamp="2024-02-12 19:45:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:45:12.72247655 +0000 UTC m=+15.194223458" watchObservedRunningTime="2024-02-12 19:45:12.723084951 +0000 UTC m=+15.194831859" Feb 12 19:45:13.219708 env[1337]: time="2024-02-12T19:45:13.219655217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-8zknm,Uid:77789baa-74bc-43d2-8543-18bdc0e13259,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:45:13.278909 env[1337]: time="2024-02-12T19:45:13.278792879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:13.278909 env[1337]: time="2024-02-12T19:45:13.278853479Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:13.278909 env[1337]: time="2024-02-12T19:45:13.278876379Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:13.279437 env[1337]: time="2024-02-12T19:45:13.279371580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2 pid=2763 runtime=io.containerd.runc.v2 Feb 12 19:45:13.301170 systemd[1]: Started cri-containerd-b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2.scope. Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit: BPF prog-id=114 op=LOAD Feb 12 19:45:13.314000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:13.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346530373137376132313866326437313265353263623434393262 Feb 12 19:45:13.314000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.314000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:13.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346530373137376132313866326437313265353263623434393262 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit: BPF prog-id=115 op=LOAD Feb 12 19:45:13.315000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000389040 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:13.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346530373137376132313866326437313265353263623434393262 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.315000 audit: BPF prog-id=116 op=LOAD Feb 12 19:45:13.315000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000389088 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:13.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346530373137376132313866326437313265353263623434393262 Feb 12 19:45:13.316000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:45:13.316000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:13.316000 audit: BPF prog-id=117 op=LOAD Feb 12 19:45:13.316000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000389498 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:13.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230346530373137376132313866326437313265353263623434393262 Feb 12 19:45:13.343589 env[1337]: time="2024-02-12T19:45:13.343548455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-8zknm,Uid:77789baa-74bc-43d2-8543-18bdc0e13259,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2\"" Feb 12 19:45:13.346302 env[1337]: time="2024-02-12T19:45:13.345613261Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:45:13.736966 systemd[1]: run-containerd-runc-k8s.io-b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2-runc.eHrJzJ.mount: Deactivated successfully. Feb 12 19:45:14.702650 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1796474211.mount: Deactivated successfully. Feb 12 19:45:15.852413 env[1337]: time="2024-02-12T19:45:15.852364593Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:15.860938 env[1337]: time="2024-02-12T19:45:15.860902316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:15.865961 env[1337]: time="2024-02-12T19:45:15.865914529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:15.872261 env[1337]: time="2024-02-12T19:45:15.872231946Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:15.872887 env[1337]: time="2024-02-12T19:45:15.872840447Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 19:45:15.876076 env[1337]: time="2024-02-12T19:45:15.876044556Z" level=info msg="CreateContainer within sandbox \"b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:45:15.908209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount209738335.mount: Deactivated successfully. Feb 12 19:45:15.922294 env[1337]: time="2024-02-12T19:45:15.922252878Z" level=info msg="CreateContainer within sandbox \"b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f\"" Feb 12 19:45:15.923053 env[1337]: time="2024-02-12T19:45:15.923025480Z" level=info msg="StartContainer for \"5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f\"" Feb 12 19:45:15.948406 systemd[1]: Started cri-containerd-5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f.scope. Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.959000 audit: BPF prog-id=118 op=LOAD Feb 12 19:45:15.960000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.960000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2763 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:15.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363563376530303266323062396238383362646237666530383566 Feb 12 19:45:15.960000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.960000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2763 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:15.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363563376530303266323062396238383362646237666530383566 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit: BPF prog-id=119 op=LOAD Feb 12 19:45:15.961000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8cd0 items=0 ppid=2763 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363563376530303266323062396238383362646237666530383566 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit: BPF prog-id=120 op=LOAD Feb 12 19:45:15.961000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a8d18 items=0 ppid=2763 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363563376530303266323062396238383362646237666530383566 Feb 12 19:45:15.961000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:45:15.961000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { perfmon } for pid=2804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit[2804]: AVC avc: denied { bpf } for pid=2804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:15.961000 audit: BPF prog-id=121 op=LOAD Feb 12 19:45:15.961000 audit[2804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a9128 items=0 ppid=2763 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:15.961000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530363563376530303266323062396238383362646237666530383566 Feb 12 19:45:15.978142 env[1337]: time="2024-02-12T19:45:15.978104626Z" level=info msg="StartContainer for \"5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f\" returns successfully" Feb 12 19:45:16.728036 kubelet[2467]: I0212 19:45:16.728002 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-8zknm" podStartSLOduration=3.199694097 podCreationTimestamp="2024-02-12 19:45:11 +0000 UTC" firstStartedPulling="2024-02-12 19:45:13.344909259 +0000 UTC m=+15.816656167" lastFinishedPulling="2024-02-12 19:45:15.873174648 +0000 UTC m=+18.344921556" observedRunningTime="2024-02-12 19:45:16.727480885 +0000 UTC m=+19.199227793" watchObservedRunningTime="2024-02-12 19:45:16.727959486 +0000 UTC m=+19.199706494" Feb 12 19:45:17.813000 audit[2836]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.823892 kernel: kauditd_printk_skb: 370 callbacks suppressed Feb 12 19:45:17.824003 kernel: audit: type=1325 audit(1707767117.813:1057): table=filter:93 family=2 entries=15 op=nft_register_rule pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.813000 audit[2836]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffecbe23290 a2=0 a3=7ffecbe2327c items=0 ppid=2616 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.848488 kernel: audit: type=1300 audit(1707767117.813:1057): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffecbe23290 a2=0 a3=7ffecbe2327c items=0 ppid=2616 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.848655 kernel: audit: type=1327 audit(1707767117.813:1057): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.868632 kernel: audit: type=1325 audit(1707767117.813:1058): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.813000 audit[2836]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.813000 audit[2836]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffecbe23290 a2=0 a3=31030 items=0 ppid=2616 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.899556 kernel: audit: type=1300 audit(1707767117.813:1058): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffecbe23290 a2=0 a3=31030 items=0 ppid=2616 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.899640 kernel: audit: type=1327 audit(1707767117.813:1058): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.899665 kernel: audit: type=1325 audit(1707767117.869:1059): table=filter:95 family=2 entries=16 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.869000 audit[2838]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.869000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc0b899570 a2=0 a3=7ffc0b89955c items=0 ppid=2616 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.930039 kernel: audit: type=1300 audit(1707767117.869:1059): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc0b899570 a2=0 a3=7ffc0b89955c items=0 ppid=2616 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.930159 kernel: audit: type=1327 audit(1707767117.869:1059): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.869000 audit[2838]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.869000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc0b899570 a2=0 a3=31030 items=0 ppid=2616 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:17.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:17.955921 kernel: audit: type=1325 audit(1707767117.869:1060): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:17.976977 kubelet[2467]: I0212 19:45:17.976934 2467 topology_manager.go:215] "Topology Admit Handler" podUID="2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" podNamespace="calico-system" podName="calico-typha-6b8b4d8675-jt58w" Feb 12 19:45:17.983524 systemd[1]: Created slice kubepods-besteffort-pod2ac6d624_4b40_4ff0_af44_528bb3e0a1c8.slice. Feb 12 19:45:18.069387 kubelet[2467]: I0212 19:45:18.069256 2467 topology_manager.go:215] "Topology Admit Handler" podUID="08fea574-d2f3-4e78-a8ea-8a9e2365d48e" podNamespace="calico-system" podName="calico-node-zmzmk" Feb 12 19:45:18.075445 systemd[1]: Created slice kubepods-besteffort-pod08fea574_d2f3_4e78_a8ea_8a9e2365d48e.slice. Feb 12 19:45:18.091055 kubelet[2467]: I0212 19:45:18.091025 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgvck\" (UniqueName: \"kubernetes.io/projected/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-kube-api-access-rgvck\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091190 kubelet[2467]: I0212 19:45:18.091074 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-lib-modules\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091190 kubelet[2467]: I0212 19:45:18.091100 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-log-dir\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091190 kubelet[2467]: I0212 19:45:18.091126 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-run-calico\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091190 kubelet[2467]: I0212 19:45:18.091153 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-flexvol-driver-host\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091190 kubelet[2467]: I0212 19:45:18.091182 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x2f59\" (UniqueName: \"kubernetes.io/projected/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-kube-api-access-x2f59\") pod \"calico-typha-6b8b4d8675-jt58w\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " pod="calico-system/calico-typha-6b8b4d8675-jt58w" Feb 12 19:45:18.091418 kubelet[2467]: I0212 19:45:18.091210 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-xtables-lock\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091418 kubelet[2467]: I0212 19:45:18.091237 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-bin-dir\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091418 kubelet[2467]: I0212 19:45:18.091267 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-net-dir\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091418 kubelet[2467]: I0212 19:45:18.091295 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-typha-certs\") pod \"calico-typha-6b8b4d8675-jt58w\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " pod="calico-system/calico-typha-6b8b4d8675-jt58w" Feb 12 19:45:18.091418 kubelet[2467]: I0212 19:45:18.091322 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-node-certs\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091620 kubelet[2467]: I0212 19:45:18.091351 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-lib-calico\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091620 kubelet[2467]: I0212 19:45:18.091382 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-tigera-ca-bundle\") pod \"calico-typha-6b8b4d8675-jt58w\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " pod="calico-system/calico-typha-6b8b4d8675-jt58w" Feb 12 19:45:18.091620 kubelet[2467]: I0212 19:45:18.091415 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-policysync\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.091620 kubelet[2467]: I0212 19:45:18.091444 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-tigera-ca-bundle\") pod \"calico-node-zmzmk\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " pod="calico-system/calico-node-zmzmk" Feb 12 19:45:18.195086 kubelet[2467]: E0212 19:45:18.195060 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.195301 kubelet[2467]: W0212 19:45:18.195280 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.195451 kubelet[2467]: E0212 19:45:18.195436 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.195838 kubelet[2467]: E0212 19:45:18.195825 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.195957 kubelet[2467]: W0212 19:45:18.195946 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.196042 kubelet[2467]: E0212 19:45:18.196033 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.197123 kubelet[2467]: E0212 19:45:18.197105 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.197245 kubelet[2467]: W0212 19:45:18.197229 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.197344 kubelet[2467]: E0212 19:45:18.197332 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.197647 kubelet[2467]: E0212 19:45:18.197632 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.197787 kubelet[2467]: W0212 19:45:18.197773 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.198032 kubelet[2467]: E0212 19:45:18.198017 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.199087 kubelet[2467]: I0212 19:45:18.199069 2467 topology_manager.go:215] "Topology Admit Handler" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" podNamespace="calico-system" podName="csi-node-driver-qm5rg" Feb 12 19:45:18.199589 kubelet[2467]: E0212 19:45:18.199562 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:18.200239 kubelet[2467]: E0212 19:45:18.200225 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.200368 kubelet[2467]: W0212 19:45:18.200354 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.200548 kubelet[2467]: E0212 19:45:18.200536 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.200856 kubelet[2467]: E0212 19:45:18.200841 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.201013 kubelet[2467]: W0212 19:45:18.200995 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.201203 kubelet[2467]: E0212 19:45:18.201191 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.201425 kubelet[2467]: E0212 19:45:18.201414 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.201521 kubelet[2467]: W0212 19:45:18.201500 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.201696 kubelet[2467]: E0212 19:45:18.201684 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.201948 kubelet[2467]: E0212 19:45:18.201934 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.202059 kubelet[2467]: W0212 19:45:18.202045 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.202234 kubelet[2467]: E0212 19:45:18.202222 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.202465 kubelet[2467]: E0212 19:45:18.202452 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.202562 kubelet[2467]: W0212 19:45:18.202549 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.202722 kubelet[2467]: E0212 19:45:18.202710 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.202947 kubelet[2467]: E0212 19:45:18.202935 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.203067 kubelet[2467]: W0212 19:45:18.203054 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.203234 kubelet[2467]: E0212 19:45:18.203222 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.203438 kubelet[2467]: E0212 19:45:18.203427 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.203535 kubelet[2467]: W0212 19:45:18.203522 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.203707 kubelet[2467]: E0212 19:45:18.203698 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.203956 kubelet[2467]: E0212 19:45:18.203944 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.204060 kubelet[2467]: W0212 19:45:18.204047 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.204253 kubelet[2467]: E0212 19:45:18.204240 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.211366 kubelet[2467]: E0212 19:45:18.211355 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.211484 kubelet[2467]: W0212 19:45:18.211474 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.211632 kubelet[2467]: E0212 19:45:18.211624 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.211823 kubelet[2467]: E0212 19:45:18.211815 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.211920 kubelet[2467]: W0212 19:45:18.211910 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.212081 kubelet[2467]: E0212 19:45:18.212073 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.212259 kubelet[2467]: E0212 19:45:18.212251 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.212326 kubelet[2467]: W0212 19:45:18.212317 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.212448 kubelet[2467]: E0212 19:45:18.212441 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.212617 kubelet[2467]: E0212 19:45:18.212608 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.212712 kubelet[2467]: W0212 19:45:18.212699 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.212890 kubelet[2467]: E0212 19:45:18.212875 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.213508 kubelet[2467]: E0212 19:45:18.213493 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.213608 kubelet[2467]: W0212 19:45:18.213596 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.213732 kubelet[2467]: E0212 19:45:18.213722 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.214822 kubelet[2467]: E0212 19:45:18.214806 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.214986 kubelet[2467]: W0212 19:45:18.214970 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.218083 kubelet[2467]: E0212 19:45:18.218066 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.218237 kubelet[2467]: W0212 19:45:18.218221 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.225375 kubelet[2467]: E0212 19:45:18.225357 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.225504 kubelet[2467]: E0212 19:45:18.225493 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.225731 kubelet[2467]: E0212 19:45:18.225718 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.225858 kubelet[2467]: W0212 19:45:18.225835 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.227056 kubelet[2467]: E0212 19:45:18.227042 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.227313 kubelet[2467]: E0212 19:45:18.227300 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.227412 kubelet[2467]: W0212 19:45:18.227399 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.227627 kubelet[2467]: E0212 19:45:18.227614 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.227873 kubelet[2467]: E0212 19:45:18.227854 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.227973 kubelet[2467]: W0212 19:45:18.227962 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.228143 kubelet[2467]: E0212 19:45:18.228134 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.228533 kubelet[2467]: E0212 19:45:18.228519 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.228649 kubelet[2467]: W0212 19:45:18.228637 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.228858 kubelet[2467]: E0212 19:45:18.228846 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.229112 kubelet[2467]: E0212 19:45:18.229093 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.229230 kubelet[2467]: W0212 19:45:18.229219 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.229382 kubelet[2467]: E0212 19:45:18.229372 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.229612 kubelet[2467]: E0212 19:45:18.229595 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.229710 kubelet[2467]: W0212 19:45:18.229698 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.229900 kubelet[2467]: E0212 19:45:18.229886 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.230376 kubelet[2467]: E0212 19:45:18.230361 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.230492 kubelet[2467]: W0212 19:45:18.230479 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.230661 kubelet[2467]: E0212 19:45:18.230651 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.233769 kubelet[2467]: E0212 19:45:18.233755 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.233888 kubelet[2467]: W0212 19:45:18.233874 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.234088 kubelet[2467]: E0212 19:45:18.234075 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.241886 kubelet[2467]: E0212 19:45:18.241848 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.242002 kubelet[2467]: W0212 19:45:18.241989 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.242158 kubelet[2467]: E0212 19:45:18.242149 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.242617 kubelet[2467]: E0212 19:45:18.242603 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.242739 kubelet[2467]: W0212 19:45:18.242725 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.242907 kubelet[2467]: E0212 19:45:18.242893 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.243145 kubelet[2467]: E0212 19:45:18.243133 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.243241 kubelet[2467]: W0212 19:45:18.243227 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.243446 kubelet[2467]: E0212 19:45:18.243433 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.243685 kubelet[2467]: E0212 19:45:18.243673 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.243782 kubelet[2467]: W0212 19:45:18.243769 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.243926 kubelet[2467]: E0212 19:45:18.243912 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.244248 kubelet[2467]: E0212 19:45:18.244232 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.244354 kubelet[2467]: W0212 19:45:18.244341 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.244448 kubelet[2467]: E0212 19:45:18.244438 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.244770 kubelet[2467]: E0212 19:45:18.244758 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.244923 kubelet[2467]: W0212 19:45:18.244856 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.245084 kubelet[2467]: E0212 19:45:18.245073 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.245300 kubelet[2467]: E0212 19:45:18.245290 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.245394 kubelet[2467]: W0212 19:45:18.245382 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.245477 kubelet[2467]: E0212 19:45:18.245467 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.254852 kubelet[2467]: E0212 19:45:18.254837 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.255001 kubelet[2467]: W0212 19:45:18.254986 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.255096 kubelet[2467]: E0212 19:45:18.255085 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.256258 kubelet[2467]: E0212 19:45:18.255326 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.256258 kubelet[2467]: W0212 19:45:18.255340 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.256258 kubelet[2467]: E0212 19:45:18.255366 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.275127 kubelet[2467]: E0212 19:45:18.269177 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.275127 kubelet[2467]: W0212 19:45:18.269197 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.275127 kubelet[2467]: E0212 19:45:18.269217 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.275632 kubelet[2467]: E0212 19:45:18.275515 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.275632 kubelet[2467]: W0212 19:45:18.275539 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.275632 kubelet[2467]: E0212 19:45:18.275558 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.276124 kubelet[2467]: E0212 19:45:18.275986 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.276124 kubelet[2467]: W0212 19:45:18.276003 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.276124 kubelet[2467]: E0212 19:45:18.276030 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.277757 kubelet[2467]: E0212 19:45:18.276420 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.277757 kubelet[2467]: W0212 19:45:18.276434 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.277757 kubelet[2467]: E0212 19:45:18.276461 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.278109 kubelet[2467]: E0212 19:45:18.278092 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.278109 kubelet[2467]: W0212 19:45:18.278108 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.278243 kubelet[2467]: E0212 19:45:18.278125 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.278347 kubelet[2467]: E0212 19:45:18.278331 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.278413 kubelet[2467]: W0212 19:45:18.278348 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.278413 kubelet[2467]: E0212 19:45:18.278363 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.278582 kubelet[2467]: E0212 19:45:18.278553 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.278582 kubelet[2467]: W0212 19:45:18.278569 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.278582 kubelet[2467]: E0212 19:45:18.278584 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.278769 kubelet[2467]: E0212 19:45:18.278755 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.278824 kubelet[2467]: W0212 19:45:18.278771 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.278824 kubelet[2467]: E0212 19:45:18.278786 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.279009 kubelet[2467]: E0212 19:45:18.278991 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.279009 kubelet[2467]: W0212 19:45:18.279008 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.279142 kubelet[2467]: E0212 19:45:18.279024 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.279240 kubelet[2467]: E0212 19:45:18.279225 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.279295 kubelet[2467]: W0212 19:45:18.279241 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.279295 kubelet[2467]: E0212 19:45:18.279256 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.279441 kubelet[2467]: E0212 19:45:18.279424 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.279496 kubelet[2467]: W0212 19:45:18.279445 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.279496 kubelet[2467]: E0212 19:45:18.279460 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.279645 kubelet[2467]: E0212 19:45:18.279629 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.279700 kubelet[2467]: W0212 19:45:18.279645 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.279700 kubelet[2467]: E0212 19:45:18.279661 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.279846 kubelet[2467]: E0212 19:45:18.279830 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.279942 kubelet[2467]: W0212 19:45:18.279847 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.279942 kubelet[2467]: E0212 19:45:18.279886 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.280084 kubelet[2467]: E0212 19:45:18.280069 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.280147 kubelet[2467]: W0212 19:45:18.280085 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.280147 kubelet[2467]: E0212 19:45:18.280102 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280266 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.281919 kubelet[2467]: W0212 19:45:18.280278 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280292 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280459 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.281919 kubelet[2467]: W0212 19:45:18.280468 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280482 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280675 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.281919 kubelet[2467]: W0212 19:45:18.280685 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280700 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.281919 kubelet[2467]: E0212 19:45:18.280908 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.282347 kubelet[2467]: W0212 19:45:18.280919 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.280933 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.281103 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.282347 kubelet[2467]: W0212 19:45:18.281112 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.281125 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.281296 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.282347 kubelet[2467]: W0212 19:45:18.281305 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.281321 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.282347 kubelet[2467]: E0212 19:45:18.281491 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.282347 kubelet[2467]: W0212 19:45:18.281500 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.282709 kubelet[2467]: E0212 19:45:18.281513 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.288226 env[1337]: time="2024-02-12T19:45:18.288184306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b8b4d8675-jt58w,Uid:2ac6d624-4b40-4ff0-af44-528bb3e0a1c8,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:18.305218 kubelet[2467]: E0212 19:45:18.305202 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.305384 kubelet[2467]: W0212 19:45:18.305369 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.305474 kubelet[2467]: E0212 19:45:18.305464 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.305575 kubelet[2467]: I0212 19:45:18.305566 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a6c5fdf4-4e55-49cb-827f-7effd0243382-varrun\") pod \"csi-node-driver-qm5rg\" (UID: \"a6c5fdf4-4e55-49cb-827f-7effd0243382\") " pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:18.305904 kubelet[2467]: E0212 19:45:18.305889 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.306051 kubelet[2467]: W0212 19:45:18.306036 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.306390 kubelet[2467]: E0212 19:45:18.306371 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.308679 kubelet[2467]: E0212 19:45:18.308643 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.308679 kubelet[2467]: W0212 19:45:18.308662 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.308956 kubelet[2467]: E0212 19:45:18.308684 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.308956 kubelet[2467]: I0212 19:45:18.308711 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a6c5fdf4-4e55-49cb-827f-7effd0243382-kubelet-dir\") pod \"csi-node-driver-qm5rg\" (UID: \"a6c5fdf4-4e55-49cb-827f-7effd0243382\") " pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:18.308956 kubelet[2467]: E0212 19:45:18.308914 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.308956 kubelet[2467]: W0212 19:45:18.308926 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.308956 kubelet[2467]: E0212 19:45:18.308943 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.309450 kubelet[2467]: E0212 19:45:18.309423 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.309450 kubelet[2467]: W0212 19:45:18.309439 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.309592 kubelet[2467]: E0212 19:45:18.309461 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.309691 kubelet[2467]: E0212 19:45:18.309675 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.309760 kubelet[2467]: W0212 19:45:18.309691 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.309760 kubelet[2467]: E0212 19:45:18.309711 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.309916 kubelet[2467]: E0212 19:45:18.309901 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.309989 kubelet[2467]: W0212 19:45:18.309917 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.309989 kubelet[2467]: E0212 19:45:18.309933 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.309989 kubelet[2467]: I0212 19:45:18.309966 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a6c5fdf4-4e55-49cb-827f-7effd0243382-socket-dir\") pod \"csi-node-driver-qm5rg\" (UID: \"a6c5fdf4-4e55-49cb-827f-7effd0243382\") " pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:18.310191 kubelet[2467]: E0212 19:45:18.310174 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.310191 kubelet[2467]: W0212 19:45:18.310191 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.310307 kubelet[2467]: E0212 19:45:18.310210 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.310307 kubelet[2467]: I0212 19:45:18.310235 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a6c5fdf4-4e55-49cb-827f-7effd0243382-registration-dir\") pod \"csi-node-driver-qm5rg\" (UID: \"a6c5fdf4-4e55-49cb-827f-7effd0243382\") " pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:18.310468 kubelet[2467]: E0212 19:45:18.310449 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.310468 kubelet[2467]: W0212 19:45:18.310465 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.310589 kubelet[2467]: E0212 19:45:18.310484 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.310589 kubelet[2467]: I0212 19:45:18.310510 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s8kpp\" (UniqueName: \"kubernetes.io/projected/a6c5fdf4-4e55-49cb-827f-7effd0243382-kube-api-access-s8kpp\") pod \"csi-node-driver-qm5rg\" (UID: \"a6c5fdf4-4e55-49cb-827f-7effd0243382\") " pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:18.310744 kubelet[2467]: E0212 19:45:18.310728 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.310744 kubelet[2467]: W0212 19:45:18.310744 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.310946 kubelet[2467]: E0212 19:45:18.310764 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.311001 kubelet[2467]: E0212 19:45:18.310960 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.311001 kubelet[2467]: W0212 19:45:18.310971 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.311001 kubelet[2467]: E0212 19:45:18.310991 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.312135 kubelet[2467]: E0212 19:45:18.311804 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.312135 kubelet[2467]: W0212 19:45:18.311819 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.312135 kubelet[2467]: E0212 19:45:18.311835 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.312135 kubelet[2467]: E0212 19:45:18.312030 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.312135 kubelet[2467]: W0212 19:45:18.312039 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.312135 kubelet[2467]: E0212 19:45:18.312057 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.313297 kubelet[2467]: E0212 19:45:18.313267 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.313297 kubelet[2467]: W0212 19:45:18.313280 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.313297 kubelet[2467]: E0212 19:45:18.313299 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.313545 kubelet[2467]: E0212 19:45:18.313481 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.313545 kubelet[2467]: W0212 19:45:18.313492 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.313545 kubelet[2467]: E0212 19:45:18.313507 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.341906 env[1337]: time="2024-02-12T19:45:18.340860040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:18.341906 env[1337]: time="2024-02-12T19:45:18.340911340Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:18.341906 env[1337]: time="2024-02-12T19:45:18.340925840Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:18.342173 env[1337]: time="2024-02-12T19:45:18.341089741Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b pid=2923 runtime=io.containerd.runc.v2 Feb 12 19:45:18.359894 systemd[1]: Started cri-containerd-206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b.scope. Feb 12 19:45:18.380961 env[1337]: time="2024-02-12T19:45:18.380916942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmzmk,Uid:08fea574-d2f3-4e78-a8ea-8a9e2365d48e,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.386000 audit: BPF prog-id=122 op=LOAD Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2923 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230366664626664393134343134656430313031616566623063643439 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2923 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230366664626664393134343134656430313031616566623063643439 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit: BPF prog-id=123 op=LOAD Feb 12 19:45:18.389000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025070 items=0 ppid=2923 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230366664626664393134343134656430313031616566623063643439 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit: BPF prog-id=124 op=LOAD Feb 12 19:45:18.389000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000250b8 items=0 ppid=2923 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230366664626664393134343134656430313031616566623063643439 Feb 12 19:45:18.389000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:45:18.389000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.389000 audit: BPF prog-id=125 op=LOAD Feb 12 19:45:18.389000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000254c8 items=0 ppid=2923 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230366664626664393134343134656430313031616566623063643439 Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.411935 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.413227 kubelet[2467]: W0212 19:45:18.411956 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.411986 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.412276 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.413227 kubelet[2467]: W0212 19:45:18.412285 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.412306 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.412514 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.413227 kubelet[2467]: W0212 19:45:18.412521 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.412536 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.413227 kubelet[2467]: E0212 19:45:18.412734 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.413681 kubelet[2467]: W0212 19:45:18.412741 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.413681 kubelet[2467]: E0212 19:45:18.412758 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.413681 kubelet[2467]: E0212 19:45:18.412967 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.413681 kubelet[2467]: W0212 19:45:18.412975 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.413681 kubelet[2467]: E0212 19:45:18.412991 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.414342 kubelet[2467]: E0212 19:45:18.414039 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.414342 kubelet[2467]: W0212 19:45:18.414052 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.414342 kubelet[2467]: E0212 19:45:18.414079 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.414342 kubelet[2467]: E0212 19:45:18.414264 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.414342 kubelet[2467]: W0212 19:45:18.414271 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.414814 kubelet[2467]: E0212 19:45:18.414603 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.414814 kubelet[2467]: E0212 19:45:18.414736 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.414814 kubelet[2467]: W0212 19:45:18.414744 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.415091 kubelet[2467]: E0212 19:45:18.415004 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.415205 kubelet[2467]: E0212 19:45:18.415197 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.415284 kubelet[2467]: W0212 19:45:18.415275 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.415441 kubelet[2467]: E0212 19:45:18.415432 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.415631 kubelet[2467]: E0212 19:45:18.415622 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.415708 kubelet[2467]: W0212 19:45:18.415699 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.415845 kubelet[2467]: E0212 19:45:18.415837 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.416067 kubelet[2467]: E0212 19:45:18.416058 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.416149 kubelet[2467]: W0212 19:45:18.416139 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.416296 kubelet[2467]: E0212 19:45:18.416287 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.416488 kubelet[2467]: E0212 19:45:18.416480 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.416559 kubelet[2467]: W0212 19:45:18.416550 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.416698 kubelet[2467]: E0212 19:45:18.416690 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.416910 kubelet[2467]: E0212 19:45:18.416901 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.416998 kubelet[2467]: W0212 19:45:18.416982 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.417130 kubelet[2467]: E0212 19:45:18.417122 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.417298 kubelet[2467]: E0212 19:45:18.417290 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.417391 kubelet[2467]: W0212 19:45:18.417382 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.417524 kubelet[2467]: E0212 19:45:18.417515 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.417684 kubelet[2467]: E0212 19:45:18.417676 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.417792 kubelet[2467]: W0212 19:45:18.417783 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.417895 kubelet[2467]: E0212 19:45:18.417886 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.418127 kubelet[2467]: E0212 19:45:18.418115 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.418476 kubelet[2467]: W0212 19:45:18.418460 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.418694 kubelet[2467]: E0212 19:45:18.418683 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.419013 kubelet[2467]: E0212 19:45:18.418994 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.419574 kubelet[2467]: W0212 19:45:18.419559 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.420619 kubelet[2467]: E0212 19:45:18.420606 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.421475 kubelet[2467]: E0212 19:45:18.421464 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.422040 kubelet[2467]: W0212 19:45:18.422017 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.422231 kubelet[2467]: E0212 19:45:18.422222 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.422447 kubelet[2467]: E0212 19:45:18.422439 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.422533 kubelet[2467]: W0212 19:45:18.422523 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.422676 kubelet[2467]: E0212 19:45:18.422667 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.422902 kubelet[2467]: E0212 19:45:18.422892 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.422993 kubelet[2467]: W0212 19:45:18.422984 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.423128 kubelet[2467]: E0212 19:45:18.423120 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.423326 kubelet[2467]: E0212 19:45:18.423317 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.423413 kubelet[2467]: W0212 19:45:18.423403 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.423569 kubelet[2467]: E0212 19:45:18.423560 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.423859 kubelet[2467]: E0212 19:45:18.423850 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.424001 kubelet[2467]: W0212 19:45:18.423990 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.424170 kubelet[2467]: E0212 19:45:18.424162 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.425765 kubelet[2467]: E0212 19:45:18.425752 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.425915 kubelet[2467]: W0212 19:45:18.425903 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.426088 kubelet[2467]: E0212 19:45:18.426079 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.426363 kubelet[2467]: E0212 19:45:18.426353 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.426467 kubelet[2467]: W0212 19:45:18.426457 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.426637 kubelet[2467]: E0212 19:45:18.426629 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.426898 kubelet[2467]: E0212 19:45:18.426888 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.427014 kubelet[2467]: W0212 19:45:18.427001 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.427109 kubelet[2467]: E0212 19:45:18.427099 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.439622 kubelet[2467]: E0212 19:45:18.439607 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:18.439737 kubelet[2467]: W0212 19:45:18.439726 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:18.439832 kubelet[2467]: E0212 19:45:18.439824 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:18.456345 env[1337]: time="2024-02-12T19:45:18.456165833Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:18.456345 env[1337]: time="2024-02-12T19:45:18.456206833Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:18.456345 env[1337]: time="2024-02-12T19:45:18.456221733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:18.456688 env[1337]: time="2024-02-12T19:45:18.456616634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e pid=2984 runtime=io.containerd.runc.v2 Feb 12 19:45:18.460122 env[1337]: time="2024-02-12T19:45:18.460055243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b8b4d8675-jt58w,Uid:2ac6d624-4b40-4ff0-af44-528bb3e0a1c8,Namespace:calico-system,Attempt:0,} returns sandbox id \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\"" Feb 12 19:45:18.463385 env[1337]: time="2024-02-12T19:45:18.463344752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:45:18.476450 systemd[1]: Started cri-containerd-4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e.scope. Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.498000 audit: BPF prog-id=126 op=LOAD Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2984 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462313431623366613633343335366138306664613065376462393162 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2984 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462313431623366613633343335366138306664613065376462393162 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.500000 audit: BPF prog-id=127 op=LOAD Feb 12 19:45:18.500000 audit[2999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000340660 items=0 ppid=2984 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462313431623366613633343335366138306664613065376462393162 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.501000 audit: BPF prog-id=128 op=LOAD Feb 12 19:45:18.501000 audit[2999]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003406a8 items=0 ppid=2984 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462313431623366613633343335366138306664613065376462393162 Feb 12 19:45:18.502000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:45:18.502000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:18.502000 audit: BPF prog-id=129 op=LOAD Feb 12 19:45:18.502000 audit[2999]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000340ab8 items=0 ppid=2984 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462313431623366613633343335366138306664613065376462393162 Feb 12 19:45:18.517019 env[1337]: time="2024-02-12T19:45:18.516977488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmzmk,Uid:08fea574-d2f3-4e78-a8ea-8a9e2365d48e,Namespace:calico-system,Attempt:0,} returns sandbox id \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\"" Feb 12 19:45:18.947000 audit[3030]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:18.947000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff2653f6c0 a2=0 a3=7fff2653f6ac items=0 ppid=2616 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:18.948000 audit[3030]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:18.948000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff2653f6c0 a2=0 a3=31030 items=0 ppid=2616 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:18.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:19.665661 kubelet[2467]: E0212 19:45:19.665627 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:19.958000 audit[3034]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:19.958000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd218f03b0 a2=0 a3=7ffd218f039c items=0 ppid=2616 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:19.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:19.959000 audit[3034]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3034 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:19.959000 audit[3034]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd218f03b0 a2=0 a3=31030 items=0 ppid=2616 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:19.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:20.820637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3432348211.mount: Deactivated successfully. Feb 12 19:45:21.665280 kubelet[2467]: E0212 19:45:21.664918 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:23.341044 env[1337]: time="2024-02-12T19:45:23.340995169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:23.348982 env[1337]: time="2024-02-12T19:45:23.348944688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:23.355297 env[1337]: time="2024-02-12T19:45:23.355267103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:23.360381 env[1337]: time="2024-02-12T19:45:23.360351115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:23.361104 env[1337]: time="2024-02-12T19:45:23.361070017Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 19:45:23.363597 env[1337]: time="2024-02-12T19:45:23.362590720Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:45:23.379926 env[1337]: time="2024-02-12T19:45:23.379848261Z" level=info msg="CreateContainer within sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:45:23.420641 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4100456505.mount: Deactivated successfully. Feb 12 19:45:23.439094 env[1337]: time="2024-02-12T19:45:23.439047803Z" level=info msg="CreateContainer within sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\"" Feb 12 19:45:23.439856 env[1337]: time="2024-02-12T19:45:23.439822804Z" level=info msg="StartContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\"" Feb 12 19:45:23.462023 systemd[1]: Started cri-containerd-a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1.scope. Feb 12 19:45:23.500806 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 12 19:45:23.500947 kernel: audit: type=1400 audit(1707767123.481:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.500985 kernel: audit: type=1400 audit(1707767123.481:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.545039 kernel: audit: type=1400 audit(1707767123.481:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.545129 kernel: audit: type=1400 audit(1707767123.481:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.545169 kernel: audit: type=1400 audit(1707767123.481:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.571604 kernel: audit: type=1400 audit(1707767123.481:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.587314 kernel: audit: type=1400 audit(1707767123.481:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.587399 kernel: audit: type=1400 audit(1707767123.481:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.627676 kernel: audit: type=1400 audit(1707767123.481:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.627754 kernel: audit: type=1400 audit(1707767123.513:1110): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.513000 audit: BPF prog-id=130 op=LOAD Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2923 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:23.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313635656430383937393939343966313464623466643664613038 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2923 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:23.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313635656430383937393939343966313464623466643664613038 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit: BPF prog-id=131 op=LOAD Feb 12 19:45:23.514000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028fad0 items=0 ppid=2923 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:23.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313635656430383937393939343966313464623466643664613038 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit: BPF prog-id=132 op=LOAD Feb 12 19:45:23.514000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028fb18 items=0 ppid=2923 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:23.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313635656430383937393939343966313464623466643664613038 Feb 12 19:45:23.514000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:45:23.514000 audit: BPF prog-id=131 op=UNLOAD Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { perfmon } for pid=3046 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit[3046]: AVC avc: denied { bpf } for pid=3046 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:23.514000 audit: BPF prog-id=133 op=LOAD Feb 12 19:45:23.514000 audit[3046]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028ff28 items=0 ppid=2923 pid=3046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:23.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136313635656430383937393939343966313464623466643664613038 Feb 12 19:45:23.647798 env[1337]: time="2024-02-12T19:45:23.647754700Z" level=info msg="StartContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" returns successfully" Feb 12 19:45:23.666062 kubelet[2467]: E0212 19:45:23.666030 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:23.737342 env[1337]: time="2024-02-12T19:45:23.737298613Z" level=info msg="StopContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" with timeout 300 (s)" Feb 12 19:45:23.738026 env[1337]: time="2024-02-12T19:45:23.737976115Z" level=info msg="Stop container \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" with signal terminated" Feb 12 19:45:23.774157 systemd[1]: cri-containerd-a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1.scope: Deactivated successfully. Feb 12 19:45:23.773000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:45:23.780000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:45:24.370160 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1-rootfs.mount: Deactivated successfully. Feb 12 19:45:24.991440 env[1337]: time="2024-02-12T19:45:24.991389474Z" level=info msg="shim disconnected" id=a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1 Feb 12 19:45:24.991440 env[1337]: time="2024-02-12T19:45:24.991442274Z" level=warning msg="cleaning up after shim disconnected" id=a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1 namespace=k8s.io Feb 12 19:45:24.991979 env[1337]: time="2024-02-12T19:45:24.991453374Z" level=info msg="cleaning up dead shim" Feb 12 19:45:24.999797 env[1337]: time="2024-02-12T19:45:24.999761393Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3092 runtime=io.containerd.runc.v2\n" Feb 12 19:45:25.004453 env[1337]: time="2024-02-12T19:45:25.004419904Z" level=info msg="StopContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" returns successfully" Feb 12 19:45:25.005147 env[1337]: time="2024-02-12T19:45:25.005108506Z" level=info msg="StopPodSandbox for \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\"" Feb 12 19:45:25.005256 env[1337]: time="2024-02-12T19:45:25.005189506Z" level=info msg="Container to stop \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 19:45:25.008189 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b-shm.mount: Deactivated successfully. Feb 12 19:45:25.016988 systemd[1]: cri-containerd-206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b.scope: Deactivated successfully. Feb 12 19:45:25.016000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:45:25.019000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:45:25.036476 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b-rootfs.mount: Deactivated successfully. Feb 12 19:45:25.057449 env[1337]: time="2024-02-12T19:45:25.057402528Z" level=info msg="shim disconnected" id=206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b Feb 12 19:45:25.057592 env[1337]: time="2024-02-12T19:45:25.057452928Z" level=warning msg="cleaning up after shim disconnected" id=206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b namespace=k8s.io Feb 12 19:45:25.057592 env[1337]: time="2024-02-12T19:45:25.057465328Z" level=info msg="cleaning up dead shim" Feb 12 19:45:25.064625 env[1337]: time="2024-02-12T19:45:25.064592144Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3123 runtime=io.containerd.runc.v2\n" Feb 12 19:45:25.064941 env[1337]: time="2024-02-12T19:45:25.064913445Z" level=info msg="TearDown network for sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" successfully" Feb 12 19:45:25.065025 env[1337]: time="2024-02-12T19:45:25.064938545Z" level=info msg="StopPodSandbox for \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" returns successfully" Feb 12 19:45:25.085884 kubelet[2467]: I0212 19:45:25.085836 2467 topology_manager.go:215] "Topology Admit Handler" podUID="8207d2f6-e6f8-47b2-9d02-59a2cd722537" podNamespace="calico-system" podName="calico-typha-679759b6f5-f8s4d" Feb 12 19:45:25.086311 kubelet[2467]: E0212 19:45:25.085964 2467 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" containerName="calico-typha" Feb 12 19:45:25.086311 kubelet[2467]: I0212 19:45:25.086005 2467 memory_manager.go:346] "RemoveStaleState removing state" podUID="2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" containerName="calico-typha" Feb 12 19:45:25.091835 systemd[1]: Created slice kubepods-besteffort-pod8207d2f6_e6f8_47b2_9d02_59a2cd722537.slice. Feb 12 19:45:25.101000 audit[3137]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:25.101000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe443f3930 a2=0 a3=7ffe443f391c items=0 ppid=2616 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:25.102000 audit[3137]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:25.102000 audit[3137]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe443f3930 a2=0 a3=31030 items=0 ppid=2616 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:25.134000 audit[3139]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:25.134000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcc90f6f40 a2=0 a3=7ffcc90f6f2c items=0 ppid=2616 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:25.134000 audit[3139]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:25.134000 audit[3139]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcc90f6f40 a2=0 a3=31030 items=0 ppid=2616 pid=3139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:25.139530 kubelet[2467]: E0212 19:45:25.139510 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.139637 kubelet[2467]: W0212 19:45:25.139530 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.139637 kubelet[2467]: E0212 19:45:25.139555 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.140025 kubelet[2467]: E0212 19:45:25.140008 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.140025 kubelet[2467]: W0212 19:45:25.140025 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.140195 kubelet[2467]: E0212 19:45:25.140054 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.140275 kubelet[2467]: E0212 19:45:25.140261 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.140329 kubelet[2467]: W0212 19:45:25.140277 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.140329 kubelet[2467]: E0212 19:45:25.140302 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.140514 kubelet[2467]: E0212 19:45:25.140499 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.140594 kubelet[2467]: W0212 19:45:25.140515 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.140594 kubelet[2467]: E0212 19:45:25.140539 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.140762 kubelet[2467]: E0212 19:45:25.140747 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.140835 kubelet[2467]: W0212 19:45:25.140762 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.140835 kubelet[2467]: E0212 19:45:25.140786 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.140999 kubelet[2467]: E0212 19:45:25.140983 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.140999 kubelet[2467]: W0212 19:45:25.140998 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.141112 kubelet[2467]: E0212 19:45:25.141022 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.141228 kubelet[2467]: E0212 19:45:25.141212 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.141228 kubelet[2467]: W0212 19:45:25.141227 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.141339 kubelet[2467]: E0212 19:45:25.141253 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.141453 kubelet[2467]: E0212 19:45:25.141438 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.141524 kubelet[2467]: W0212 19:45:25.141454 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.141524 kubelet[2467]: E0212 19:45:25.141469 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.141697 kubelet[2467]: E0212 19:45:25.141682 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.141768 kubelet[2467]: W0212 19:45:25.141697 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.141768 kubelet[2467]: E0212 19:45:25.141733 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.141945 kubelet[2467]: E0212 19:45:25.141930 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.142025 kubelet[2467]: W0212 19:45:25.141953 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.142025 kubelet[2467]: E0212 19:45:25.141969 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.142179 kubelet[2467]: E0212 19:45:25.142165 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.142249 kubelet[2467]: W0212 19:45:25.142180 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.142249 kubelet[2467]: E0212 19:45:25.142196 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.142409 kubelet[2467]: E0212 19:45:25.142394 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.142409 kubelet[2467]: W0212 19:45:25.142409 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.142516 kubelet[2467]: E0212 19:45:25.142424 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.155236 kubelet[2467]: E0212 19:45:25.155218 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.155236 kubelet[2467]: W0212 19:45:25.155232 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.155390 kubelet[2467]: E0212 19:45:25.155248 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.155390 kubelet[2467]: I0212 19:45:25.155287 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-x2f59\" (UniqueName: \"kubernetes.io/projected/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-kube-api-access-x2f59\") pod \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " Feb 12 19:45:25.155556 kubelet[2467]: E0212 19:45:25.155538 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.155556 kubelet[2467]: W0212 19:45:25.155552 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.155678 kubelet[2467]: E0212 19:45:25.155573 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.155678 kubelet[2467]: I0212 19:45:25.155606 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-tigera-ca-bundle\") pod \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " Feb 12 19:45:25.155995 kubelet[2467]: E0212 19:45:25.155973 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.156101 kubelet[2467]: W0212 19:45:25.156086 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.156185 kubelet[2467]: E0212 19:45:25.156176 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.156286 kubelet[2467]: I0212 19:45:25.156273 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-typha-certs\") pod \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\" (UID: \"2ac6d624-4b40-4ff0-af44-528bb3e0a1c8\") " Feb 12 19:45:25.157033 kubelet[2467]: E0212 19:45:25.157017 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.157169 kubelet[2467]: W0212 19:45:25.157153 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.157402 kubelet[2467]: E0212 19:45:25.157389 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.157531 kubelet[2467]: I0212 19:45:25.157521 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8207d2f6-e6f8-47b2-9d02-59a2cd722537-typha-certs\") pod \"calico-typha-679759b6f5-f8s4d\" (UID: \"8207d2f6-e6f8-47b2-9d02-59a2cd722537\") " pod="calico-system/calico-typha-679759b6f5-f8s4d" Feb 12 19:45:25.160509 systemd[1]: var-lib-kubelet-pods-2ac6d624\x2d4b40\x2d4ff0\x2daf44\x2d528bb3e0a1c8-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 12 19:45:25.161927 kubelet[2467]: E0212 19:45:25.161912 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.162034 kubelet[2467]: W0212 19:45:25.162019 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.162203 kubelet[2467]: E0212 19:45:25.162182 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.162415 kubelet[2467]: E0212 19:45:25.162403 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.162502 kubelet[2467]: W0212 19:45:25.162481 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.162611 kubelet[2467]: E0212 19:45:25.162542 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.164114 kubelet[2467]: E0212 19:45:25.164099 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.164253 kubelet[2467]: W0212 19:45:25.164239 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.164422 kubelet[2467]: E0212 19:45:25.164411 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.164545 kubelet[2467]: I0212 19:45:25.164531 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8207d2f6-e6f8-47b2-9d02-59a2cd722537-tigera-ca-bundle\") pod \"calico-typha-679759b6f5-f8s4d\" (UID: \"8207d2f6-e6f8-47b2-9d02-59a2cd722537\") " pod="calico-system/calico-typha-679759b6f5-f8s4d" Feb 12 19:45:25.166674 systemd[1]: var-lib-kubelet-pods-2ac6d624\x2d4b40\x2d4ff0\x2daf44\x2d528bb3e0a1c8-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dx2f59.mount: Deactivated successfully. Feb 12 19:45:25.168855 kubelet[2467]: I0212 19:45:25.168828 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-kube-api-access-x2f59" (OuterVolumeSpecName: "kube-api-access-x2f59") pod "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" (UID: "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8"). InnerVolumeSpecName "kube-api-access-x2f59". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 19:45:25.170070 kubelet[2467]: I0212 19:45:25.170043 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" (UID: "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 19:45:25.170163 kubelet[2467]: E0212 19:45:25.170155 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.170224 kubelet[2467]: W0212 19:45:25.170165 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.170291 kubelet[2467]: E0212 19:45:25.170275 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.170453 kubelet[2467]: E0212 19:45:25.170438 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.170453 kubelet[2467]: W0212 19:45:25.170449 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.170575 kubelet[2467]: E0212 19:45:25.170556 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.170926 kubelet[2467]: I0212 19:45:25.170852 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" (UID: "2ac6d624-4b40-4ff0-af44-528bb3e0a1c8"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 19:45:25.171057 kubelet[2467]: E0212 19:45:25.171042 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.171057 kubelet[2467]: W0212 19:45:25.171054 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.171230 kubelet[2467]: E0212 19:45:25.171156 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.171230 kubelet[2467]: I0212 19:45:25.171190 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whhcr\" (UniqueName: \"kubernetes.io/projected/8207d2f6-e6f8-47b2-9d02-59a2cd722537-kube-api-access-whhcr\") pod \"calico-typha-679759b6f5-f8s4d\" (UID: \"8207d2f6-e6f8-47b2-9d02-59a2cd722537\") " pod="calico-system/calico-typha-679759b6f5-f8s4d" Feb 12 19:45:25.171326 kubelet[2467]: E0212 19:45:25.171308 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.171326 kubelet[2467]: W0212 19:45:25.171317 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.171435 kubelet[2467]: E0212 19:45:25.171394 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.171519 kubelet[2467]: E0212 19:45:25.171501 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.171519 kubelet[2467]: W0212 19:45:25.171514 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.171633 kubelet[2467]: E0212 19:45:25.171529 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.171789 kubelet[2467]: E0212 19:45:25.171768 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.171934 kubelet[2467]: W0212 19:45:25.171845 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.171934 kubelet[2467]: E0212 19:45:25.171899 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.172165 kubelet[2467]: E0212 19:45:25.172150 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.172165 kubelet[2467]: W0212 19:45:25.172162 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.172294 kubelet[2467]: E0212 19:45:25.172178 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.172458 kubelet[2467]: E0212 19:45:25.172443 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.172458 kubelet[2467]: W0212 19:45:25.172455 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.172580 kubelet[2467]: E0212 19:45:25.172471 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.172580 kubelet[2467]: I0212 19:45:25.172517 2467 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-typha-certs\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:25.172580 kubelet[2467]: I0212 19:45:25.172534 2467 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-x2f59\" (UniqueName: \"kubernetes.io/projected/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-kube-api-access-x2f59\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:25.172580 kubelet[2467]: I0212 19:45:25.172550 2467 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8-tigera-ca-bundle\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.273586 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.279796 kubelet[2467]: W0212 19:45:25.273630 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.273766 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.274218 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.279796 kubelet[2467]: W0212 19:45:25.274232 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.274259 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.274574 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.279796 kubelet[2467]: W0212 19:45:25.274586 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.274612 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.279796 kubelet[2467]: E0212 19:45:25.274953 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280345 kubelet[2467]: W0212 19:45:25.274967 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.274991 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.275254 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280345 kubelet[2467]: W0212 19:45:25.275266 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.275361 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.275523 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280345 kubelet[2467]: W0212 19:45:25.275534 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.275633 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.280345 kubelet[2467]: E0212 19:45:25.275799 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280345 kubelet[2467]: W0212 19:45:25.275809 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280768 kubelet[2467]: E0212 19:45:25.275882 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.280768 kubelet[2467]: E0212 19:45:25.276115 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280768 kubelet[2467]: W0212 19:45:25.276127 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280768 kubelet[2467]: E0212 19:45:25.276161 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.280768 kubelet[2467]: E0212 19:45:25.276436 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.280768 kubelet[2467]: W0212 19:45:25.276449 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.280768 kubelet[2467]: E0212 19:45:25.276498 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.281174 kubelet[2467]: E0212 19:45:25.280847 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.281174 kubelet[2467]: W0212 19:45:25.280859 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.281174 kubelet[2467]: E0212 19:45:25.280886 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.281174 kubelet[2467]: E0212 19:45:25.281103 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.281174 kubelet[2467]: W0212 19:45:25.281114 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.281174 kubelet[2467]: E0212 19:45:25.281130 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.281446 kubelet[2467]: E0212 19:45:25.281380 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.281446 kubelet[2467]: W0212 19:45:25.281390 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.281446 kubelet[2467]: E0212 19:45:25.281405 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.282086 kubelet[2467]: E0212 19:45:25.282070 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.282209 kubelet[2467]: W0212 19:45:25.282184 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.282295 kubelet[2467]: E0212 19:45:25.282215 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.282430 kubelet[2467]: E0212 19:45:25.282416 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.282430 kubelet[2467]: W0212 19:45:25.282427 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.282542 kubelet[2467]: E0212 19:45:25.282447 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.282652 kubelet[2467]: E0212 19:45:25.282635 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.282652 kubelet[2467]: W0212 19:45:25.282648 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.282754 kubelet[2467]: E0212 19:45:25.282663 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.282920 kubelet[2467]: E0212 19:45:25.282905 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.282920 kubelet[2467]: W0212 19:45:25.282917 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.283059 kubelet[2467]: E0212 19:45:25.282932 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.283163 kubelet[2467]: E0212 19:45:25.283149 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.283163 kubelet[2467]: W0212 19:45:25.283161 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.283289 kubelet[2467]: E0212 19:45:25.283176 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.291028 kubelet[2467]: E0212 19:45:25.291011 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.291028 kubelet[2467]: W0212 19:45:25.291023 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.291137 kubelet[2467]: E0212 19:45:25.291038 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.371650 systemd[1]: var-lib-kubelet-pods-2ac6d624\x2d4b40\x2d4ff0\x2daf44\x2d528bb3e0a1c8-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 12 19:45:25.398130 env[1337]: time="2024-02-12T19:45:25.398081320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-679759b6f5-f8s4d,Uid:8207d2f6-e6f8-47b2-9d02-59a2cd722537,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:25.434802 env[1337]: time="2024-02-12T19:45:25.434733505Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:25.434997 env[1337]: time="2024-02-12T19:45:25.434772305Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:25.434997 env[1337]: time="2024-02-12T19:45:25.434981206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:25.435259 env[1337]: time="2024-02-12T19:45:25.435209006Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666 pid=3198 runtime=io.containerd.runc.v2 Feb 12 19:45:25.453310 systemd[1]: Started cri-containerd-30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666.scope. Feb 12 19:45:25.461519 systemd[1]: run-containerd-runc-k8s.io-30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666-runc.ybLcdj.mount: Deactivated successfully. Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit: BPF prog-id=134 op=LOAD Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3198 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343934626230386632666336653039383832646139326536636166 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3198 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343934626230386632666336653039383832646139326536636166 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit: BPF prog-id=135 op=LOAD Feb 12 19:45:25.474000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002b7fc0 items=0 ppid=3198 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343934626230386632666336653039383832646139326536636166 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.474000 audit: BPF prog-id=136 op=LOAD Feb 12 19:45:25.474000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000334008 items=0 ppid=3198 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343934626230386632666336653039383832646139326536636166 Feb 12 19:45:25.475000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:45:25.475000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.475000 audit: BPF prog-id=137 op=LOAD Feb 12 19:45:25.475000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000334418 items=0 ppid=3198 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330343934626230386632666336653039383832646139326536636166 Feb 12 19:45:25.501717 env[1337]: time="2024-02-12T19:45:25.501676261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-679759b6f5-f8s4d,Uid:8207d2f6-e6f8-47b2-9d02-59a2cd722537,Namespace:calico-system,Attempt:0,} returns sandbox id \"30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666\"" Feb 12 19:45:25.511612 env[1337]: time="2024-02-12T19:45:25.511577884Z" level=info msg="CreateContainer within sandbox \"30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:45:25.570900 env[1337]: time="2024-02-12T19:45:25.570406721Z" level=info msg="CreateContainer within sandbox \"30494bb08f2fc6e09882da92e6cafd8725704adb1682879004506a5420bb2666\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"d27f79cbea733dc0cc0c0c3b17d5b705526c29a8e9a93985953e274f3ffc1c27\"" Feb 12 19:45:25.571197 env[1337]: time="2024-02-12T19:45:25.571167323Z" level=info msg="StartContainer for \"d27f79cbea733dc0cc0c0c3b17d5b705526c29a8e9a93985953e274f3ffc1c27\"" Feb 12 19:45:25.588559 systemd[1]: Started cri-containerd-d27f79cbea733dc0cc0c0c3b17d5b705526c29a8e9a93985953e274f3ffc1c27.scope. Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit: BPF prog-id=138 op=LOAD Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3198 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376637396362656137333364633063633063306333623137643562 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3198 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376637396362656137333364633063633063306333623137643562 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.606000 audit: BPF prog-id=139 op=LOAD Feb 12 19:45:25.606000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002efdc0 items=0 ppid=3198 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376637396362656137333364633063633063306333623137643562 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit: BPF prog-id=140 op=LOAD Feb 12 19:45:25.607000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0002efe08 items=0 ppid=3198 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376637396362656137333364633063633063306333623137643562 Feb 12 19:45:25.607000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:45:25.607000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { perfmon } for pid=3240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit[3240]: AVC avc: denied { bpf } for pid=3240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:25.607000 audit: BPF prog-id=141 op=LOAD Feb 12 19:45:25.607000 audit[3240]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c00034c218 items=0 ppid=3198 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:25.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432376637396362656137333364633063633063306333623137643562 Feb 12 19:45:25.639851 env[1337]: time="2024-02-12T19:45:25.639793482Z" level=info msg="StartContainer for \"d27f79cbea733dc0cc0c0c3b17d5b705526c29a8e9a93985953e274f3ffc1c27\" returns successfully" Feb 12 19:45:25.665499 kubelet[2467]: E0212 19:45:25.665105 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:25.673692 systemd[1]: Removed slice kubepods-besteffort-pod2ac6d624_4b40_4ff0_af44_528bb3e0a1c8.slice. Feb 12 19:45:25.741402 kubelet[2467]: I0212 19:45:25.740826 2467 scope.go:117] "RemoveContainer" containerID="a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1" Feb 12 19:45:25.745320 env[1337]: time="2024-02-12T19:45:25.745282228Z" level=info msg="RemoveContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\"" Feb 12 19:45:25.756424 env[1337]: time="2024-02-12T19:45:25.756389554Z" level=info msg="RemoveContainer for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" returns successfully" Feb 12 19:45:25.756738 kubelet[2467]: I0212 19:45:25.756714 2467 scope.go:117] "RemoveContainer" containerID="a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1" Feb 12 19:45:25.757017 env[1337]: time="2024-02-12T19:45:25.756931455Z" level=error msg="ContainerStatus for \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\": not found" Feb 12 19:45:25.757301 kubelet[2467]: E0212 19:45:25.757281 2467 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\": not found" containerID="a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1" Feb 12 19:45:25.757390 kubelet[2467]: I0212 19:45:25.757350 2467 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1"} err="failed to get container status \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\": rpc error: code = NotFound desc = an error occurred when try to find container \"a6165ed089799949f14db4fd6da08680eaf9db11312238ffde9c659a313ba8e1\": not found" Feb 12 19:45:25.770100 kubelet[2467]: I0212 19:45:25.770077 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-679759b6f5-f8s4d" podStartSLOduration=7.770038485 podCreationTimestamp="2024-02-12 19:45:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:45:25.761382065 +0000 UTC m=+28.233128973" watchObservedRunningTime="2024-02-12 19:45:25.770038485 +0000 UTC m=+28.241785493" Feb 12 19:45:25.847205 kubelet[2467]: E0212 19:45:25.847104 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.847205 kubelet[2467]: W0212 19:45:25.847129 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.847205 kubelet[2467]: E0212 19:45:25.847156 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.847496 kubelet[2467]: E0212 19:45:25.847369 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.847496 kubelet[2467]: W0212 19:45:25.847379 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.847496 kubelet[2467]: E0212 19:45:25.847395 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.847818 kubelet[2467]: E0212 19:45:25.847800 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.847818 kubelet[2467]: W0212 19:45:25.847813 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.847832 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848071 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849449 kubelet[2467]: W0212 19:45:25.848080 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848091 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848294 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849449 kubelet[2467]: W0212 19:45:25.848302 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848312 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848496 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849449 kubelet[2467]: W0212 19:45:25.848504 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849449 kubelet[2467]: E0212 19:45:25.848514 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.848718 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849816 kubelet[2467]: W0212 19:45:25.848725 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.848735 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.849351 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849816 kubelet[2467]: W0212 19:45:25.849362 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.849377 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.849593 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.849816 kubelet[2467]: W0212 19:45:25.849603 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.849816 kubelet[2467]: E0212 19:45:25.849619 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.850292 kubelet[2467]: E0212 19:45:25.850275 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.850292 kubelet[2467]: W0212 19:45:25.850291 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.850425 kubelet[2467]: E0212 19:45:25.850307 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.850606 kubelet[2467]: E0212 19:45:25.850590 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.850686 kubelet[2467]: W0212 19:45:25.850608 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.850686 kubelet[2467]: E0212 19:45:25.850624 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.850928 kubelet[2467]: E0212 19:45:25.850910 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.850928 kubelet[2467]: W0212 19:45:25.850926 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.851065 kubelet[2467]: E0212 19:45:25.850941 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.851250 kubelet[2467]: E0212 19:45:25.851215 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.851250 kubelet[2467]: W0212 19:45:25.851250 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.851367 kubelet[2467]: E0212 19:45:25.851266 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.851550 kubelet[2467]: E0212 19:45:25.851532 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.851550 kubelet[2467]: W0212 19:45:25.851544 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.851705 kubelet[2467]: E0212 19:45:25.851560 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.851853 kubelet[2467]: E0212 19:45:25.851838 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.851946 kubelet[2467]: W0212 19:45:25.851849 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.851946 kubelet[2467]: E0212 19:45:25.851906 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.880185 kubelet[2467]: E0212 19:45:25.880160 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.880185 kubelet[2467]: W0212 19:45:25.880177 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.880399 kubelet[2467]: E0212 19:45:25.880198 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.880468 kubelet[2467]: E0212 19:45:25.880461 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.880531 kubelet[2467]: W0212 19:45:25.880473 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.880531 kubelet[2467]: E0212 19:45:25.880492 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.880801 kubelet[2467]: E0212 19:45:25.880778 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.880801 kubelet[2467]: W0212 19:45:25.880796 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.881014 kubelet[2467]: E0212 19:45:25.880821 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.881135 kubelet[2467]: E0212 19:45:25.881112 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.881135 kubelet[2467]: W0212 19:45:25.881130 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.881278 kubelet[2467]: E0212 19:45:25.881156 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.881436 kubelet[2467]: E0212 19:45:25.881416 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.881436 kubelet[2467]: W0212 19:45:25.881431 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.881600 kubelet[2467]: E0212 19:45:25.881457 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.881725 kubelet[2467]: E0212 19:45:25.881708 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.881725 kubelet[2467]: W0212 19:45:25.881723 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.881846 kubelet[2467]: E0212 19:45:25.881750 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.882076 kubelet[2467]: E0212 19:45:25.882057 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.882076 kubelet[2467]: W0212 19:45:25.882075 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.882231 kubelet[2467]: E0212 19:45:25.882179 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.882551 kubelet[2467]: E0212 19:45:25.882530 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.882551 kubelet[2467]: W0212 19:45:25.882546 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.882706 kubelet[2467]: E0212 19:45:25.882666 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.882858 kubelet[2467]: E0212 19:45:25.882839 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.882858 kubelet[2467]: W0212 19:45:25.882853 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.883119 kubelet[2467]: E0212 19:45:25.883099 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.883200 kubelet[2467]: W0212 19:45:25.883120 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.883200 kubelet[2467]: E0212 19:45:25.883139 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.883323 kubelet[2467]: E0212 19:45:25.883076 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.883488 kubelet[2467]: E0212 19:45:25.883469 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.883488 kubelet[2467]: W0212 19:45:25.883483 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.883649 kubelet[2467]: E0212 19:45:25.883512 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.883747 kubelet[2467]: E0212 19:45:25.883725 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.883747 kubelet[2467]: W0212 19:45:25.883743 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.883941 kubelet[2467]: E0212 19:45:25.883762 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.884055 kubelet[2467]: E0212 19:45:25.884031 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.884055 kubelet[2467]: W0212 19:45:25.884050 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.884222 kubelet[2467]: E0212 19:45:25.884074 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.884493 kubelet[2467]: E0212 19:45:25.884474 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.884493 kubelet[2467]: W0212 19:45:25.884488 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.884627 kubelet[2467]: E0212 19:45:25.884609 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.884793 kubelet[2467]: E0212 19:45:25.884775 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.884793 kubelet[2467]: W0212 19:45:25.884789 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.885056 kubelet[2467]: E0212 19:45:25.884809 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.885120 kubelet[2467]: E0212 19:45:25.885068 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.885120 kubelet[2467]: W0212 19:45:25.885080 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.885120 kubelet[2467]: E0212 19:45:25.885103 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.885392 kubelet[2467]: E0212 19:45:25.885375 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.885392 kubelet[2467]: W0212 19:45:25.885390 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.885536 kubelet[2467]: E0212 19:45:25.885409 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:25.886032 kubelet[2467]: E0212 19:45:25.886008 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:25.886032 kubelet[2467]: W0212 19:45:25.886027 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:25.886153 kubelet[2467]: E0212 19:45:25.886048 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.144000 audit[3304]: NETFILTER_CFG table=filter:105 family=2 entries=15 op=nft_register_rule pid=3304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:26.144000 audit[3304]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffeab30f6b0 a2=0 a3=7ffeab30f69c items=0 ppid=2616 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:26.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:26.145000 audit[3304]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:45:26.145000 audit[3304]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffeab30f6b0 a2=0 a3=7ffeab30f69c items=0 ppid=2616 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:26.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:45:26.758833 kubelet[2467]: E0212 19:45:26.758805 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.758833 kubelet[2467]: W0212 19:45:26.758821 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.759405 kubelet[2467]: E0212 19:45:26.758845 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.759405 kubelet[2467]: E0212 19:45:26.759111 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.759405 kubelet[2467]: W0212 19:45:26.759122 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.759405 kubelet[2467]: E0212 19:45:26.759137 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.759405 kubelet[2467]: E0212 19:45:26.759364 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.759405 kubelet[2467]: W0212 19:45:26.759375 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.759405 kubelet[2467]: E0212 19:45:26.759390 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.759741 kubelet[2467]: E0212 19:45:26.759558 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.759741 kubelet[2467]: W0212 19:45:26.759567 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.759741 kubelet[2467]: E0212 19:45:26.759580 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.759926 kubelet[2467]: E0212 19:45:26.759745 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.759926 kubelet[2467]: W0212 19:45:26.759753 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.759926 kubelet[2467]: E0212 19:45:26.759768 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.760067 kubelet[2467]: E0212 19:45:26.759972 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.760067 kubelet[2467]: W0212 19:45:26.759982 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.760067 kubelet[2467]: E0212 19:45:26.759997 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.760226 kubelet[2467]: E0212 19:45:26.760161 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.760226 kubelet[2467]: W0212 19:45:26.760170 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.760226 kubelet[2467]: E0212 19:45:26.760183 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.760421 kubelet[2467]: E0212 19:45:26.760402 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.760421 kubelet[2467]: W0212 19:45:26.760417 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.760524 kubelet[2467]: E0212 19:45:26.760436 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.760654 kubelet[2467]: E0212 19:45:26.760637 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.760654 kubelet[2467]: W0212 19:45:26.760649 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.760789 kubelet[2467]: E0212 19:45:26.760664 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.760851 kubelet[2467]: E0212 19:45:26.760836 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.760940 kubelet[2467]: W0212 19:45:26.760852 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.760940 kubelet[2467]: E0212 19:45:26.760889 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.761080 kubelet[2467]: E0212 19:45:26.761061 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.761080 kubelet[2467]: W0212 19:45:26.761075 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.761190 kubelet[2467]: E0212 19:45:26.761091 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.761326 kubelet[2467]: E0212 19:45:26.761307 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.761326 kubelet[2467]: W0212 19:45:26.761321 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.761455 kubelet[2467]: E0212 19:45:26.761337 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.761524 kubelet[2467]: E0212 19:45:26.761508 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.761574 kubelet[2467]: W0212 19:45:26.761525 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.761574 kubelet[2467]: E0212 19:45:26.761539 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.761719 kubelet[2467]: E0212 19:45:26.761704 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.761719 kubelet[2467]: W0212 19:45:26.761716 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.761834 kubelet[2467]: E0212 19:45:26.761730 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.761968 kubelet[2467]: E0212 19:45:26.761912 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.761968 kubelet[2467]: W0212 19:45:26.761921 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.761968 kubelet[2467]: E0212 19:45:26.761936 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.787128 kubelet[2467]: E0212 19:45:26.787109 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.787283 kubelet[2467]: W0212 19:45:26.787270 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.787359 kubelet[2467]: E0212 19:45:26.787350 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.787687 kubelet[2467]: E0212 19:45:26.787674 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.787785 kubelet[2467]: W0212 19:45:26.787775 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.787903 kubelet[2467]: E0212 19:45:26.787893 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.788195 kubelet[2467]: E0212 19:45:26.788185 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.788289 kubelet[2467]: W0212 19:45:26.788278 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.788369 kubelet[2467]: E0212 19:45:26.788360 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.788619 kubelet[2467]: E0212 19:45:26.788609 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.788706 kubelet[2467]: W0212 19:45:26.788695 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.788807 kubelet[2467]: E0212 19:45:26.788799 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.789133 kubelet[2467]: E0212 19:45:26.789119 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.789236 kubelet[2467]: W0212 19:45:26.789222 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.789350 kubelet[2467]: E0212 19:45:26.789324 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.789566 kubelet[2467]: E0212 19:45:26.789550 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.789566 kubelet[2467]: W0212 19:45:26.789563 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.789705 kubelet[2467]: E0212 19:45:26.789584 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.789776 kubelet[2467]: E0212 19:45:26.789761 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.789824 kubelet[2467]: W0212 19:45:26.789778 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.789824 kubelet[2467]: E0212 19:45:26.789794 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.790030 kubelet[2467]: E0212 19:45:26.790015 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.790030 kubelet[2467]: W0212 19:45:26.790031 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.790119 kubelet[2467]: E0212 19:45:26.790046 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.791048 kubelet[2467]: E0212 19:45:26.791034 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.791165 kubelet[2467]: W0212 19:45:26.791143 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.791327 kubelet[2467]: E0212 19:45:26.791318 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.791625 kubelet[2467]: E0212 19:45:26.791606 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.791704 kubelet[2467]: W0212 19:45:26.791693 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.791778 kubelet[2467]: E0212 19:45:26.791770 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.792145 kubelet[2467]: E0212 19:45:26.792131 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.792241 kubelet[2467]: W0212 19:45:26.792230 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.792311 kubelet[2467]: E0212 19:45:26.792303 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.793231 kubelet[2467]: E0212 19:45:26.793216 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.793532 kubelet[2467]: W0212 19:45:26.793517 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.793642 kubelet[2467]: E0212 19:45:26.793633 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.795371 kubelet[2467]: E0212 19:45:26.795357 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.795775 kubelet[2467]: W0212 19:45:26.795593 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.795775 kubelet[2467]: E0212 19:45:26.795622 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.796055 kubelet[2467]: E0212 19:45:26.796043 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.796147 kubelet[2467]: W0212 19:45:26.796136 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.796219 kubelet[2467]: E0212 19:45:26.796212 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.796510 kubelet[2467]: E0212 19:45:26.796494 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.796612 kubelet[2467]: W0212 19:45:26.796600 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.796684 kubelet[2467]: E0212 19:45:26.796677 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.797001 kubelet[2467]: E0212 19:45:26.796987 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.797138 kubelet[2467]: W0212 19:45:26.797123 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.797247 kubelet[2467]: E0212 19:45:26.797238 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.797755 kubelet[2467]: E0212 19:45:26.797742 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.797877 kubelet[2467]: W0212 19:45:26.797852 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.797987 kubelet[2467]: E0212 19:45:26.797977 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:26.799097 kubelet[2467]: E0212 19:45:26.799077 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:26.799097 kubelet[2467]: W0212 19:45:26.799092 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:26.799233 kubelet[2467]: E0212 19:45:26.799122 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.666964 kubelet[2467]: E0212 19:45:27.666931 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:27.668761 kubelet[2467]: I0212 19:45:27.668736 2467 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="2ac6d624-4b40-4ff0-af44-528bb3e0a1c8" path="/var/lib/kubelet/pods/2ac6d624-4b40-4ff0-af44-528bb3e0a1c8/volumes" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768164 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.769020 kubelet[2467]: W0212 19:45:27.768183 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768219 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768424 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.769020 kubelet[2467]: W0212 19:45:27.768434 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768458 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768632 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.769020 kubelet[2467]: W0212 19:45:27.768642 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768656 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.769020 kubelet[2467]: E0212 19:45:27.768849 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.769928 kubelet[2467]: W0212 19:45:27.768858 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.769928 kubelet[2467]: E0212 19:45:27.768914 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.770108 kubelet[2467]: E0212 19:45:27.770088 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.770189 kubelet[2467]: W0212 19:45:27.770109 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.770189 kubelet[2467]: E0212 19:45:27.770125 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.770327 kubelet[2467]: E0212 19:45:27.770310 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.770327 kubelet[2467]: W0212 19:45:27.770326 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.770453 kubelet[2467]: E0212 19:45:27.770341 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.770531 kubelet[2467]: E0212 19:45:27.770513 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.770608 kubelet[2467]: W0212 19:45:27.770532 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.770608 kubelet[2467]: E0212 19:45:27.770547 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.770734 kubelet[2467]: E0212 19:45:27.770720 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.770818 kubelet[2467]: W0212 19:45:27.770735 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.770818 kubelet[2467]: E0212 19:45:27.770750 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.770981 kubelet[2467]: E0212 19:45:27.770967 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.771118 kubelet[2467]: W0212 19:45:27.770982 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.771118 kubelet[2467]: E0212 19:45:27.770998 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.771237 kubelet[2467]: E0212 19:45:27.771181 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.771237 kubelet[2467]: W0212 19:45:27.771190 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.771237 kubelet[2467]: E0212 19:45:27.771204 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.771428 kubelet[2467]: E0212 19:45:27.771368 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.771428 kubelet[2467]: W0212 19:45:27.771378 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.771428 kubelet[2467]: E0212 19:45:27.771392 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.771607 kubelet[2467]: E0212 19:45:27.771592 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.771671 kubelet[2467]: W0212 19:45:27.771608 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.771671 kubelet[2467]: E0212 19:45:27.771623 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.771920 kubelet[2467]: E0212 19:45:27.771903 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.771920 kubelet[2467]: W0212 19:45:27.771919 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.772081 kubelet[2467]: E0212 19:45:27.771934 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.772174 kubelet[2467]: E0212 19:45:27.772162 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.772174 kubelet[2467]: W0212 19:45:27.772172 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.772286 kubelet[2467]: E0212 19:45:27.772188 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.772379 kubelet[2467]: E0212 19:45:27.772363 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.772448 kubelet[2467]: W0212 19:45:27.772379 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.772448 kubelet[2467]: E0212 19:45:27.772397 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.795788 kubelet[2467]: E0212 19:45:27.795765 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.795788 kubelet[2467]: W0212 19:45:27.795782 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.796011 kubelet[2467]: E0212 19:45:27.795804 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.796064 kubelet[2467]: E0212 19:45:27.796037 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.796064 kubelet[2467]: W0212 19:45:27.796047 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.796064 kubelet[2467]: E0212 19:45:27.796063 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.796262 kubelet[2467]: E0212 19:45:27.796247 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.796338 kubelet[2467]: W0212 19:45:27.796263 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.796338 kubelet[2467]: E0212 19:45:27.796278 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.796542 kubelet[2467]: E0212 19:45:27.796520 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.796631 kubelet[2467]: W0212 19:45:27.796612 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.796694 kubelet[2467]: E0212 19:45:27.796638 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.796894 kubelet[2467]: E0212 19:45:27.796876 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.796894 kubelet[2467]: W0212 19:45:27.796891 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.797049 kubelet[2467]: E0212 19:45:27.796913 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.797140 kubelet[2467]: E0212 19:45:27.797110 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.797140 kubelet[2467]: W0212 19:45:27.797136 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.797249 kubelet[2467]: E0212 19:45:27.797157 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.797431 kubelet[2467]: E0212 19:45:27.797417 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.797512 kubelet[2467]: W0212 19:45:27.797500 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.797605 kubelet[2467]: E0212 19:45:27.797566 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.797897 kubelet[2467]: E0212 19:45:27.797879 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.797897 kubelet[2467]: W0212 19:45:27.797894 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.798058 kubelet[2467]: E0212 19:45:27.797915 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.798134 kubelet[2467]: E0212 19:45:27.798117 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.798134 kubelet[2467]: W0212 19:45:27.798131 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.798261 kubelet[2467]: E0212 19:45:27.798211 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.798340 kubelet[2467]: E0212 19:45:27.798325 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.798340 kubelet[2467]: W0212 19:45:27.798338 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.798618 kubelet[2467]: E0212 19:45:27.798418 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.798618 kubelet[2467]: E0212 19:45:27.798543 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.798618 kubelet[2467]: W0212 19:45:27.798552 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.798618 kubelet[2467]: E0212 19:45:27.798570 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.798843 kubelet[2467]: E0212 19:45:27.798754 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.798843 kubelet[2467]: W0212 19:45:27.798764 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.798843 kubelet[2467]: E0212 19:45:27.798785 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.799058 kubelet[2467]: E0212 19:45:27.799039 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.799058 kubelet[2467]: W0212 19:45:27.799053 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.799177 kubelet[2467]: E0212 19:45:27.799073 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.799570 kubelet[2467]: E0212 19:45:27.799553 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.799570 kubelet[2467]: W0212 19:45:27.799566 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.799771 kubelet[2467]: E0212 19:45:27.799722 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.799924 kubelet[2467]: E0212 19:45:27.799907 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.799924 kubelet[2467]: W0212 19:45:27.799920 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.800065 kubelet[2467]: E0212 19:45:27.799936 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.800133 kubelet[2467]: E0212 19:45:27.800116 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.800133 kubelet[2467]: W0212 19:45:27.800129 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.800246 kubelet[2467]: E0212 19:45:27.800145 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.800366 kubelet[2467]: E0212 19:45:27.800351 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.800366 kubelet[2467]: W0212 19:45:27.800363 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.800490 kubelet[2467]: E0212 19:45:27.800378 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.800716 kubelet[2467]: E0212 19:45:27.800701 2467 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:45:27.800789 kubelet[2467]: W0212 19:45:27.800729 2467 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:45:27.800789 kubelet[2467]: E0212 19:45:27.800746 2467 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:45:27.962574 env[1337]: time="2024-02-12T19:45:27.961050905Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:27.970139 env[1337]: time="2024-02-12T19:45:27.970101325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:27.975910 env[1337]: time="2024-02-12T19:45:27.975853638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:27.979334 env[1337]: time="2024-02-12T19:45:27.979302046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:27.980277 env[1337]: time="2024-02-12T19:45:27.980247348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:45:27.983192 env[1337]: time="2024-02-12T19:45:27.983157555Z" level=info msg="CreateContainer within sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:45:28.012540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3224984301.mount: Deactivated successfully. Feb 12 19:45:28.034570 env[1337]: time="2024-02-12T19:45:28.034528071Z" level=info msg="CreateContainer within sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\"" Feb 12 19:45:28.036431 env[1337]: time="2024-02-12T19:45:28.036395075Z" level=info msg="StartContainer for \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\"" Feb 12 19:45:28.064595 systemd[1]: Started cri-containerd-4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d.scope. Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f28a6b51c68 items=0 ppid=2984 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:28.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462383465666565346566306365376636353433333963336437663866 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.078000 audit: BPF prog-id=142 op=LOAD Feb 12 19:45:28.078000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000099388 items=0 ppid=2984 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:28.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462383465666565346566306365376636353433333963336437663866 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit: BPF prog-id=143 op=LOAD Feb 12 19:45:28.079000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000993d8 items=0 ppid=2984 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462383465666565346566306365376636353433333963336437663866 Feb 12 19:45:28.079000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:45:28.079000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { perfmon } for pid=3379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:28.079000 audit: BPF prog-id=144 op=LOAD Feb 12 19:45:28.079000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000099468 items=0 ppid=2984 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:28.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462383465666565346566306365376636353433333963336437663866 Feb 12 19:45:28.101798 env[1337]: time="2024-02-12T19:45:28.101732222Z" level=info msg="StartContainer for \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\" returns successfully" Feb 12 19:45:28.111311 systemd[1]: cri-containerd-4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d.scope: Deactivated successfully. Feb 12 19:45:28.113000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:45:28.132116 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d-rootfs.mount: Deactivated successfully. Feb 12 19:45:28.349585 env[1337]: time="2024-02-12T19:45:28.346686273Z" level=info msg="shim disconnected" id=4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d Feb 12 19:45:28.349585 env[1337]: time="2024-02-12T19:45:28.346749473Z" level=warning msg="cleaning up after shim disconnected" id=4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d namespace=k8s.io Feb 12 19:45:28.349585 env[1337]: time="2024-02-12T19:45:28.346762373Z" level=info msg="cleaning up dead shim" Feb 12 19:45:28.356591 env[1337]: time="2024-02-12T19:45:28.356551195Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3416 runtime=io.containerd.runc.v2\n" Feb 12 19:45:28.754145 env[1337]: time="2024-02-12T19:45:28.754088589Z" level=info msg="StopPodSandbox for \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\"" Feb 12 19:45:28.754493 env[1337]: time="2024-02-12T19:45:28.754457289Z" level=info msg="Container to stop \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 19:45:28.773942 kernel: kauditd_printk_skb: 227 callbacks suppressed Feb 12 19:45:28.774088 kernel: audit: type=1334 audit(1707767128.762:1172): prog-id=126 op=UNLOAD Feb 12 19:45:28.762000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:45:28.763087 systemd[1]: cri-containerd-4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e.scope: Deactivated successfully. Feb 12 19:45:28.776000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:45:28.784111 kernel: audit: type=1334 audit(1707767128.776:1173): prog-id=129 op=UNLOAD Feb 12 19:45:28.811753 env[1337]: time="2024-02-12T19:45:28.811692418Z" level=info msg="shim disconnected" id=4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e Feb 12 19:45:28.812033 env[1337]: time="2024-02-12T19:45:28.812007419Z" level=warning msg="cleaning up after shim disconnected" id=4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e namespace=k8s.io Feb 12 19:45:28.812161 env[1337]: time="2024-02-12T19:45:28.812143819Z" level=info msg="cleaning up dead shim" Feb 12 19:45:28.819962 env[1337]: time="2024-02-12T19:45:28.819931037Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3446 runtime=io.containerd.runc.v2\n" Feb 12 19:45:28.820258 env[1337]: time="2024-02-12T19:45:28.820224737Z" level=info msg="TearDown network for sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" successfully" Feb 12 19:45:28.820337 env[1337]: time="2024-02-12T19:45:28.820259737Z" level=info msg="StopPodSandbox for \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" returns successfully" Feb 12 19:45:28.906532 kubelet[2467]: I0212 19:45:28.906493 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-run-calico\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906541 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-flexvol-driver-host\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906570 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-policysync\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906650 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-rgvck\" (UniqueName: \"kubernetes.io/projected/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-kube-api-access-rgvck\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906689 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-lib-calico\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906722 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-bin-dir\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907097 kubelet[2467]: I0212 19:45:28.906750 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-net-dir\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.906796 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-xtables-lock\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.906838 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-node-certs\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.906892 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-log-dir\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.906929 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-tigera-ca-bundle\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.906959 2467 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-lib-modules\") pod \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\" (UID: \"08fea574-d2f3-4e78-a8ea-8a9e2365d48e\") " Feb 12 19:45:28.907437 kubelet[2467]: I0212 19:45:28.907031 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.907709 kubelet[2467]: I0212 19:45:28.907074 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.907709 kubelet[2467]: I0212 19:45:28.907101 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.907709 kubelet[2467]: I0212 19:45:28.907127 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-policysync" (OuterVolumeSpecName: "policysync") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.907920 kubelet[2467]: I0212 19:45:28.907894 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.908053 kubelet[2467]: I0212 19:45:28.908035 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.908251 kubelet[2467]: I0212 19:45:28.908211 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.908411 kubelet[2467]: I0212 19:45:28.908394 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.908568 kubelet[2467]: I0212 19:45:28.908552 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 19:45:28.909312 kubelet[2467]: I0212 19:45:28.909289 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 19:45:28.910600 kubelet[2467]: I0212 19:45:28.910564 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-kube-api-access-rgvck" (OuterVolumeSpecName: "kube-api-access-rgvck") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "kube-api-access-rgvck". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 19:45:28.912688 kubelet[2467]: I0212 19:45:28.912656 2467 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-node-certs" (OuterVolumeSpecName: "node-certs") pod "08fea574-d2f3-4e78-a8ea-8a9e2365d48e" (UID: "08fea574-d2f3-4e78-a8ea-8a9e2365d48e"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 19:45:29.006744 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e-rootfs.mount: Deactivated successfully. Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009738 2467 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-rgvck\" (UniqueName: \"kubernetes.io/projected/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-kube-api-access-rgvck\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009774 2467 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-lib-calico\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009791 2467 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-bin-dir\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009820 2467 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-net-dir\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009836 2467 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-cni-log-dir\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010135 kubelet[2467]: I0212 19:45:29.009848 2467 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-xtables-lock\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.006901 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e-shm.mount: Deactivated successfully. Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010372 2467 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-node-certs\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010406 2467 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-lib-modules\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010423 2467 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-tigera-ca-bundle\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010448 2467 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-var-run-calico\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010463 2467 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-flexvol-driver-host\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.010518 kubelet[2467]: I0212 19:45:29.010481 2467 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/08fea574-d2f3-4e78-a8ea-8a9e2365d48e-policysync\") on node \"ci-3510.3.2-a-3bedefc55b\" DevicePath \"\"" Feb 12 19:45:29.007010 systemd[1]: var-lib-kubelet-pods-08fea574\x2dd2f3\x2d4e78\x2da8ea\x2d8a9e2365d48e-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 12 19:45:29.007113 systemd[1]: var-lib-kubelet-pods-08fea574\x2dd2f3\x2d4e78\x2da8ea\x2d8a9e2365d48e-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2drgvck.mount: Deactivated successfully. Feb 12 19:45:29.664990 kubelet[2467]: E0212 19:45:29.664928 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:29.673061 systemd[1]: Removed slice kubepods-besteffort-pod08fea574_d2f3_4e78_a8ea_8a9e2365d48e.slice. Feb 12 19:45:29.757339 kubelet[2467]: I0212 19:45:29.757310 2467 scope.go:117] "RemoveContainer" containerID="4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d" Feb 12 19:45:29.761974 env[1337]: time="2024-02-12T19:45:29.761579735Z" level=info msg="RemoveContainer for \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\"" Feb 12 19:45:29.775397 env[1337]: time="2024-02-12T19:45:29.775349065Z" level=info msg="RemoveContainer for \"4b84efee4ef0ce7f654339c3d7f8f1a50f8ccea9592ef47f2d076febf3e29b7d\" returns successfully" Feb 12 19:45:29.805685 kubelet[2467]: I0212 19:45:29.805650 2467 topology_manager.go:215] "Topology Admit Handler" podUID="2847c99f-83d4-4055-9171-3002cf57c93e" podNamespace="calico-system" podName="calico-node-jdxzs" Feb 12 19:45:29.805854 kubelet[2467]: E0212 19:45:29.805737 2467 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="08fea574-d2f3-4e78-a8ea-8a9e2365d48e" containerName="flexvol-driver" Feb 12 19:45:29.805854 kubelet[2467]: I0212 19:45:29.805770 2467 memory_manager.go:346] "RemoveStaleState removing state" podUID="08fea574-d2f3-4e78-a8ea-8a9e2365d48e" containerName="flexvol-driver" Feb 12 19:45:29.811400 systemd[1]: Created slice kubepods-besteffort-pod2847c99f_83d4_4055_9171_3002cf57c93e.slice. Feb 12 19:45:29.916574 kubelet[2467]: I0212 19:45:29.916448 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-xtables-lock\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.916574 kubelet[2467]: I0212 19:45:29.916500 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2847c99f-83d4-4055-9171-3002cf57c93e-node-certs\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.916574 kubelet[2467]: I0212 19:45:29.916535 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-var-lib-calico\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917560 kubelet[2467]: I0212 19:45:29.917503 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-policysync\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917714 kubelet[2467]: I0212 19:45:29.917588 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-66xxj\" (UniqueName: \"kubernetes.io/projected/2847c99f-83d4-4055-9171-3002cf57c93e-kube-api-access-66xxj\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917714 kubelet[2467]: I0212 19:45:29.917624 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-lib-modules\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917714 kubelet[2467]: I0212 19:45:29.917656 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-cni-net-dir\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917714 kubelet[2467]: I0212 19:45:29.917696 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-var-run-calico\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917989 kubelet[2467]: I0212 19:45:29.917730 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-cni-log-dir\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917989 kubelet[2467]: I0212 19:45:29.917765 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-flexvol-driver-host\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917989 kubelet[2467]: I0212 19:45:29.917803 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2847c99f-83d4-4055-9171-3002cf57c93e-cni-bin-dir\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:29.917989 kubelet[2467]: I0212 19:45:29.917843 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2847c99f-83d4-4055-9171-3002cf57c93e-tigera-ca-bundle\") pod \"calico-node-jdxzs\" (UID: \"2847c99f-83d4-4055-9171-3002cf57c93e\") " pod="calico-system/calico-node-jdxzs" Feb 12 19:45:30.117375 env[1337]: time="2024-02-12T19:45:30.117329823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jdxzs,Uid:2847c99f-83d4-4055-9171-3002cf57c93e,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:30.377998 env[1337]: time="2024-02-12T19:45:30.377911896Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:45:30.377998 env[1337]: time="2024-02-12T19:45:30.377963596Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:45:30.377998 env[1337]: time="2024-02-12T19:45:30.377977696Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:45:30.378441 env[1337]: time="2024-02-12T19:45:30.378386597Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2 pid=3474 runtime=io.containerd.runc.v2 Feb 12 19:45:30.397017 systemd[1]: Started cri-containerd-ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2.scope. Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423921 kernel: audit: type=1400 audit(1707767130.409:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.452387 kernel: audit: type=1400 audit(1707767130.409:1175): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.452506 kernel: audit: type=1400 audit(1707767130.409:1176): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.467659 env[1337]: time="2024-02-12T19:45:30.454349664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jdxzs,Uid:2847c99f-83d4-4055-9171-3002cf57c93e,Namespace:calico-system,Attempt:0,} returns sandbox id \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\"" Feb 12 19:45:30.467963 kernel: audit: type=1400 audit(1707767130.409:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.479030 env[1337]: time="2024-02-12T19:45:30.472150203Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:45:30.480886 kernel: audit: type=1400 audit(1707767130.409:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.508058 kernel: audit: type=1400 audit(1707767130.409:1179): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.508138 kernel: audit: type=1400 audit(1707767130.409:1180): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.508166 kernel: audit: type=1400 audit(1707767130.409:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.422000 audit: BPF prog-id=145 op=LOAD Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3474 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373666376238653737396531373363616663313861366233306561 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3474 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373666376238653737396531373363616663313861366233306561 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit: BPF prog-id=146 op=LOAD Feb 12 19:45:30.423000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000388ec0 items=0 ppid=3474 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373666376238653737396531373363616663313861366233306561 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit: BPF prog-id=147 op=LOAD Feb 12 19:45:30.423000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000388f08 items=0 ppid=3474 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373666376238653737396531373363616663313861366233306561 Feb 12 19:45:30.423000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:45:30.423000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { perfmon } for pid=3483 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit[3483]: AVC avc: denied { bpf } for pid=3483 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.423000 audit: BPF prog-id=148 op=LOAD Feb 12 19:45:30.423000 audit[3483]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000389318 items=0 ppid=3474 pid=3483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373666376238653737396531373363616663313861366233306561 Feb 12 19:45:30.774279 env[1337]: time="2024-02-12T19:45:30.769738358Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573\"" Feb 12 19:45:30.774279 env[1337]: time="2024-02-12T19:45:30.770380459Z" level=info msg="StartContainer for \"6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573\"" Feb 12 19:45:30.789319 systemd[1]: Started cri-containerd-6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573.scope. Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7f028819b608 items=0 ppid=3474 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333633313866396164353234313032663733646537303763336239 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit: BPF prog-id=149 op=LOAD Feb 12 19:45:30.807000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00027e2b8 items=0 ppid=3474 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333633313866396164353234313032663733646537303763336239 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit: BPF prog-id=150 op=LOAD Feb 12 19:45:30.807000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00027e308 items=0 ppid=3474 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333633313866396164353234313032663733646537303763336239 Feb 12 19:45:30.807000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:45:30.807000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:30.807000 audit: BPF prog-id=151 op=LOAD Feb 12 19:45:30.807000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00027e398 items=0 ppid=3474 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333633313866396164353234313032663733646537303763336239 Feb 12 19:45:30.826346 env[1337]: time="2024-02-12T19:45:30.826240282Z" level=info msg="StartContainer for \"6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573\" returns successfully" Feb 12 19:45:30.837338 systemd[1]: cri-containerd-6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573.scope: Deactivated successfully. Feb 12 19:45:30.838000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:45:31.665294 kubelet[2467]: E0212 19:45:31.665256 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:31.668640 kubelet[2467]: I0212 19:45:31.668606 2467 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="08fea574-d2f3-4e78-a8ea-8a9e2365d48e" path="/var/lib/kubelet/pods/08fea574-d2f3-4e78-a8ea-8a9e2365d48e/volumes" Feb 12 19:45:33.662481 env[1337]: time="2024-02-12T19:45:33.662408107Z" level=info msg="shim disconnected" id=6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573 Feb 12 19:45:33.662481 env[1337]: time="2024-02-12T19:45:33.662474108Z" level=warning msg="cleaning up after shim disconnected" id=6e36318f9ad524102f73de707c3b98b3aa3f83a368be34f5dc93779940c60573 namespace=k8s.io Feb 12 19:45:33.662481 env[1337]: time="2024-02-12T19:45:33.662488808Z" level=info msg="cleaning up dead shim" Feb 12 19:45:33.666605 kubelet[2467]: E0212 19:45:33.666573 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:33.674662 env[1337]: time="2024-02-12T19:45:33.674617934Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3559 runtime=io.containerd.runc.v2\n" Feb 12 19:45:33.778127 env[1337]: time="2024-02-12T19:45:33.778082254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:45:35.665672 kubelet[2467]: E0212 19:45:35.665626 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:36.870589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1858348597.mount: Deactivated successfully. Feb 12 19:45:37.665654 kubelet[2467]: E0212 19:45:37.665606 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:39.665809 kubelet[2467]: E0212 19:45:39.665214 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:41.664955 kubelet[2467]: E0212 19:45:41.664915 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:43.666083 kubelet[2467]: E0212 19:45:43.665755 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:45.666404 kubelet[2467]: E0212 19:45:45.666366 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:47.665292 kubelet[2467]: E0212 19:45:47.665243 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:48.070760 env[1337]: time="2024-02-12T19:45:48.070277584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:48.118811 env[1337]: time="2024-02-12T19:45:48.118758475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:48.160497 env[1337]: time="2024-02-12T19:45:48.160448353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:48.163764 env[1337]: time="2024-02-12T19:45:48.163713659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:45:48.164640 env[1337]: time="2024-02-12T19:45:48.164607361Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:45:48.168550 env[1337]: time="2024-02-12T19:45:48.168516768Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:45:48.470132 env[1337]: time="2024-02-12T19:45:48.470062635Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda\"" Feb 12 19:45:48.470966 env[1337]: time="2024-02-12T19:45:48.470933736Z" level=info msg="StartContainer for \"07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda\"" Feb 12 19:45:48.501461 systemd[1]: Started cri-containerd-07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda.scope. Feb 12 19:45:48.505951 systemd[1]: run-containerd-runc-k8s.io-07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda-runc.sEke1Y.mount: Deactivated successfully. Feb 12 19:45:48.549588 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 12 19:45:48.549832 kernel: audit: type=1400 audit(1707767148.530:1199): avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1a30392968 items=0 ppid=3474 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:48.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626565616538623266376434346134303561336339343437353866 Feb 12 19:45:48.569889 kernel: audit: type=1300 audit(1707767148.530:1199): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1a30392968 items=0 ppid=3474 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:48.569932 kernel: audit: type=1327 audit(1707767148.530:1199): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626565616538623266376434346134303561336339343437353866 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.617290 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.629984 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.630049 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.634254 env[1337]: time="2024-02-12T19:45:48.633714742Z" level=info msg="StartContainer for \"07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda\" returns successfully" Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.658278 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.660174 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.660219 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.687545 kernel: audit: type=1400 audit(1707767148.530:1200): avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.530000 audit: BPF prog-id=152 op=LOAD Feb 12 19:45:48.530000 audit[3582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000296778 items=0 ppid=3474 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:48.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626565616538623266376434346134303561336339343437353866 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.548000 audit: BPF prog-id=153 op=LOAD Feb 12 19:45:48.548000 audit[3582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002967c8 items=0 ppid=3474 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:48.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626565616538623266376434346134303561336339343437353866 Feb 12 19:45:48.549000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:45:48.549000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { perfmon } for pid=3582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit[3582]: AVC avc: denied { bpf } for pid=3582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:45:48.549000 audit: BPF prog-id=154 op=LOAD Feb 12 19:45:48.549000 audit[3582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000296858 items=0 ppid=3474 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:45:48.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037626565616538623266376434346134303561336339343437353866 Feb 12 19:45:49.665746 kubelet[2467]: E0212 19:45:49.664988 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:50.311219 env[1337]: time="2024-02-12T19:45:50.310840971Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:45:50.314837 systemd[1]: cri-containerd-07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda.scope: Deactivated successfully. Feb 12 19:45:50.317000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:45:50.338685 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda-rootfs.mount: Deactivated successfully. Feb 12 19:45:50.378115 kubelet[2467]: I0212 19:45:50.377640 2467 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:45:50.407060 kubelet[2467]: I0212 19:45:50.406229 2467 topology_manager.go:215] "Topology Admit Handler" podUID="3dfb911a-daee-409f-82ae-6be195f7e89b" podNamespace="kube-system" podName="coredns-5dd5756b68-5cvhk" Feb 12 19:45:50.412876 systemd[1]: Created slice kubepods-burstable-pod3dfb911a_daee_409f_82ae_6be195f7e89b.slice. Feb 12 19:45:50.414531 kubelet[2467]: I0212 19:45:50.414504 2467 topology_manager.go:215] "Topology Admit Handler" podUID="0b46e87c-b59c-4353-8a23-d46d6d006b74" podNamespace="kube-system" podName="coredns-5dd5756b68-nrbjz" Feb 12 19:45:50.414884 kubelet[2467]: I0212 19:45:50.414856 2467 topology_manager.go:215] "Topology Admit Handler" podUID="6aa62b87-34ad-4d93-b5f8-e9e7359629b3" podNamespace="calico-system" podName="calico-kube-controllers-784b5bcdbd-xqxrj" Feb 12 19:45:50.425570 systemd[1]: Created slice kubepods-burstable-pod0b46e87c_b59c_4353_8a23_d46d6d006b74.slice. Feb 12 19:45:50.431992 systemd[1]: Created slice kubepods-besteffort-pod6aa62b87_34ad_4d93_b5f8_e9e7359629b3.slice. Feb 12 19:45:50.461989 kubelet[2467]: I0212 19:45:50.461954 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6aa62b87-34ad-4d93-b5f8-e9e7359629b3-tigera-ca-bundle\") pod \"calico-kube-controllers-784b5bcdbd-xqxrj\" (UID: \"6aa62b87-34ad-4d93-b5f8-e9e7359629b3\") " pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" Feb 12 19:45:50.462247 kubelet[2467]: I0212 19:45:50.462222 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9v7dt\" (UniqueName: \"kubernetes.io/projected/6aa62b87-34ad-4d93-b5f8-e9e7359629b3-kube-api-access-9v7dt\") pod \"calico-kube-controllers-784b5bcdbd-xqxrj\" (UID: \"6aa62b87-34ad-4d93-b5f8-e9e7359629b3\") " pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" Feb 12 19:45:50.462379 kubelet[2467]: I0212 19:45:50.462369 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0b46e87c-b59c-4353-8a23-d46d6d006b74-config-volume\") pod \"coredns-5dd5756b68-nrbjz\" (UID: \"0b46e87c-b59c-4353-8a23-d46d6d006b74\") " pod="kube-system/coredns-5dd5756b68-nrbjz" Feb 12 19:45:50.462494 kubelet[2467]: I0212 19:45:50.462484 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q9wtn\" (UniqueName: \"kubernetes.io/projected/3dfb911a-daee-409f-82ae-6be195f7e89b-kube-api-access-q9wtn\") pod \"coredns-5dd5756b68-5cvhk\" (UID: \"3dfb911a-daee-409f-82ae-6be195f7e89b\") " pod="kube-system/coredns-5dd5756b68-5cvhk" Feb 12 19:45:50.462613 kubelet[2467]: I0212 19:45:50.462603 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fgk9x\" (UniqueName: \"kubernetes.io/projected/0b46e87c-b59c-4353-8a23-d46d6d006b74-kube-api-access-fgk9x\") pod \"coredns-5dd5756b68-nrbjz\" (UID: \"0b46e87c-b59c-4353-8a23-d46d6d006b74\") " pod="kube-system/coredns-5dd5756b68-nrbjz" Feb 12 19:45:50.462735 kubelet[2467]: I0212 19:45:50.462726 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3dfb911a-daee-409f-82ae-6be195f7e89b-config-volume\") pod \"coredns-5dd5756b68-5cvhk\" (UID: \"3dfb911a-daee-409f-82ae-6be195f7e89b\") " pod="kube-system/coredns-5dd5756b68-5cvhk" Feb 12 19:45:51.655000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:51.655000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:51.655000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879480 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:51.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:51.655000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a71a70 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:45:51.655000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:45:51.669837 systemd[1]: Created slice kubepods-besteffort-poda6c5fdf4_4e55_49cb_827f_7effd0243382.slice. Feb 12 19:45:52.048599 env[1337]: time="2024-02-12T19:45:52.047712575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qm5rg,Uid:a6c5fdf4-4e55-49cb-827f-7effd0243382,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:52.096886 env[1337]: time="2024-02-12T19:45:52.096808765Z" level=info msg="shim disconnected" id=07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda Feb 12 19:45:52.096886 env[1337]: time="2024-02-12T19:45:52.096874165Z" level=warning msg="cleaning up after shim disconnected" id=07beeae8b2f7d44a405a3c944758f62c421041b2db36c4bb9f9c6192a6c3ecda namespace=k8s.io Feb 12 19:45:52.096886 env[1337]: time="2024-02-12T19:45:52.096887265Z" level=info msg="cleaning up dead shim" Feb 12 19:45:52.106549 env[1337]: time="2024-02-12T19:45:52.106499683Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:45:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3633 runtime=io.containerd.runc.v2\n" Feb 12 19:45:52.130000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.130000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00441f480 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.131000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.131000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0078db1a0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.132000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.132000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0078db200 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.132000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.176000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.176000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0046187b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.176000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.187593 env[1337]: time="2024-02-12T19:45:52.187528431Z" level=error msg="Failed to destroy network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.190341 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f-shm.mount: Deactivated successfully. Feb 12 19:45:52.191596 env[1337]: time="2024-02-12T19:45:52.191557138Z" level=error msg="encountered an error cleaning up failed sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.191744 env[1337]: time="2024-02-12T19:45:52.191714838Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qm5rg,Uid:a6c5fdf4-4e55-49cb-827f-7effd0243382,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.192103 kubelet[2467]: E0212 19:45:52.192070 2467 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.192437 kubelet[2467]: E0212 19:45:52.192133 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:52.192437 kubelet[2467]: E0212 19:45:52.192164 2467 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qm5rg" Feb 12 19:45:52.192437 kubelet[2467]: E0212 19:45:52.192246 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qm5rg_calico-system(a6c5fdf4-4e55-49cb-827f-7effd0243382)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qm5rg_calico-system(a6c5fdf4-4e55-49cb-827f-7effd0243382)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:52.219000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.219000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:45:52.219000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003305140 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.219000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0055a1680 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:45:52.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:45:52.222265 env[1337]: time="2024-02-12T19:45:52.222227294Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5cvhk,Uid:3dfb911a-daee-409f-82ae-6be195f7e89b,Namespace:kube-system,Attempt:0,}" Feb 12 19:45:52.230755 env[1337]: time="2024-02-12T19:45:52.230725310Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nrbjz,Uid:0b46e87c-b59c-4353-8a23-d46d6d006b74,Namespace:kube-system,Attempt:0,}" Feb 12 19:45:52.236789 env[1337]: time="2024-02-12T19:45:52.236755021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784b5bcdbd-xqxrj,Uid:6aa62b87-34ad-4d93-b5f8-e9e7359629b3,Namespace:calico-system,Attempt:0,}" Feb 12 19:45:52.425797 env[1337]: time="2024-02-12T19:45:52.425731666Z" level=error msg="Failed to destroy network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.426413 env[1337]: time="2024-02-12T19:45:52.426359367Z" level=error msg="encountered an error cleaning up failed sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.426621 env[1337]: time="2024-02-12T19:45:52.426563368Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5cvhk,Uid:3dfb911a-daee-409f-82ae-6be195f7e89b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.426711 env[1337]: time="2024-02-12T19:45:52.426472068Z" level=error msg="Failed to destroy network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.428525 kubelet[2467]: E0212 19:45:52.427018 2467 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.428525 kubelet[2467]: E0212 19:45:52.427083 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5cvhk" Feb 12 19:45:52.428525 kubelet[2467]: E0212 19:45:52.427112 2467 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-5cvhk" Feb 12 19:45:52.428772 env[1337]: time="2024-02-12T19:45:52.427002669Z" level=error msg="encountered an error cleaning up failed sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.428772 env[1337]: time="2024-02-12T19:45:52.427123369Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784b5bcdbd-xqxrj,Uid:6aa62b87-34ad-4d93-b5f8-e9e7359629b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.428996 kubelet[2467]: E0212 19:45:52.427180 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-5cvhk_kube-system(3dfb911a-daee-409f-82ae-6be195f7e89b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-5cvhk_kube-system(3dfb911a-daee-409f-82ae-6be195f7e89b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5cvhk" podUID="3dfb911a-daee-409f-82ae-6be195f7e89b" Feb 12 19:45:52.431144 kubelet[2467]: E0212 19:45:52.430162 2467 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.431144 kubelet[2467]: E0212 19:45:52.430319 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" Feb 12 19:45:52.431144 kubelet[2467]: E0212 19:45:52.430350 2467 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" Feb 12 19:45:52.431348 kubelet[2467]: E0212 19:45:52.430406 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-784b5bcdbd-xqxrj_calico-system(6aa62b87-34ad-4d93-b5f8-e9e7359629b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-784b5bcdbd-xqxrj_calico-system(6aa62b87-34ad-4d93-b5f8-e9e7359629b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" podUID="6aa62b87-34ad-4d93-b5f8-e9e7359629b3" Feb 12 19:45:52.439885 env[1337]: time="2024-02-12T19:45:52.439822592Z" level=error msg="Failed to destroy network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.440203 env[1337]: time="2024-02-12T19:45:52.440168493Z" level=error msg="encountered an error cleaning up failed sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.440289 env[1337]: time="2024-02-12T19:45:52.440224393Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nrbjz,Uid:0b46e87c-b59c-4353-8a23-d46d6d006b74,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.440463 kubelet[2467]: E0212 19:45:52.440431 2467 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.440555 kubelet[2467]: E0212 19:45:52.440489 2467 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nrbjz" Feb 12 19:45:52.440555 kubelet[2467]: E0212 19:45:52.440516 2467 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-nrbjz" Feb 12 19:45:52.440655 kubelet[2467]: E0212 19:45:52.440579 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-nrbjz_kube-system(0b46e87c-b59c-4353-8a23-d46d6d006b74)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-nrbjz_kube-system(0b46e87c-b59c-4353-8a23-d46d6d006b74)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nrbjz" podUID="0b46e87c-b59c-4353-8a23-d46d6d006b74" Feb 12 19:45:52.813335 kubelet[2467]: I0212 19:45:52.813219 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:45:52.814007 env[1337]: time="2024-02-12T19:45:52.813968776Z" level=info msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" Feb 12 19:45:52.817760 kubelet[2467]: I0212 19:45:52.816238 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:45:52.817905 env[1337]: time="2024-02-12T19:45:52.816695181Z" level=info msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" Feb 12 19:45:52.818374 kubelet[2467]: I0212 19:45:52.818352 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:45:52.818899 env[1337]: time="2024-02-12T19:45:52.818857085Z" level=info msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" Feb 12 19:45:52.820155 kubelet[2467]: I0212 19:45:52.819766 2467 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:45:52.821857 env[1337]: time="2024-02-12T19:45:52.820526388Z" level=info msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" Feb 12 19:45:52.825154 env[1337]: time="2024-02-12T19:45:52.823838294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:45:52.900125 env[1337]: time="2024-02-12T19:45:52.900061434Z" level=error msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" failed" error="failed to destroy network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.900716 kubelet[2467]: E0212 19:45:52.900555 2467 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:45:52.900716 kubelet[2467]: E0212 19:45:52.900603 2467 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38"} Feb 12 19:45:52.900716 kubelet[2467]: E0212 19:45:52.900654 2467 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6aa62b87-34ad-4d93-b5f8-e9e7359629b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:45:52.900716 kubelet[2467]: E0212 19:45:52.900693 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6aa62b87-34ad-4d93-b5f8-e9e7359629b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" podUID="6aa62b87-34ad-4d93-b5f8-e9e7359629b3" Feb 12 19:45:52.926480 env[1337]: time="2024-02-12T19:45:52.926418382Z" level=error msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" failed" error="failed to destroy network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.926951 kubelet[2467]: E0212 19:45:52.926921 2467 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:45:52.927092 kubelet[2467]: E0212 19:45:52.926989 2467 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7"} Feb 12 19:45:52.927092 kubelet[2467]: E0212 19:45:52.927054 2467 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3dfb911a-daee-409f-82ae-6be195f7e89b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:45:52.927092 kubelet[2467]: E0212 19:45:52.927093 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3dfb911a-daee-409f-82ae-6be195f7e89b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-5cvhk" podUID="3dfb911a-daee-409f-82ae-6be195f7e89b" Feb 12 19:45:52.961733 env[1337]: time="2024-02-12T19:45:52.961670746Z" level=error msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" failed" error="failed to destroy network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.961930 env[1337]: time="2024-02-12T19:45:52.961838146Z" level=error msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" failed" error="failed to destroy network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:45:52.962224 kubelet[2467]: E0212 19:45:52.962151 2467 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:45:52.962224 kubelet[2467]: E0212 19:45:52.962151 2467 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:45:52.962224 kubelet[2467]: E0212 19:45:52.962199 2467 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f"} Feb 12 19:45:52.962453 kubelet[2467]: E0212 19:45:52.962262 2467 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a6c5fdf4-4e55-49cb-827f-7effd0243382\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:45:52.962453 kubelet[2467]: E0212 19:45:52.962303 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a6c5fdf4-4e55-49cb-827f-7effd0243382\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qm5rg" podUID="a6c5fdf4-4e55-49cb-827f-7effd0243382" Feb 12 19:45:52.962453 kubelet[2467]: E0212 19:45:52.962199 2467 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb"} Feb 12 19:45:52.962453 kubelet[2467]: E0212 19:45:52.962362 2467 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b46e87c-b59c-4353-8a23-d46d6d006b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:45:52.962659 kubelet[2467]: E0212 19:45:52.962413 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b46e87c-b59c-4353-8a23-d46d6d006b74\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-nrbjz" podUID="0b46e87c-b59c-4353-8a23-d46d6d006b74" Feb 12 19:45:57.653407 env[1337]: time="2024-02-12T19:45:57.653298478Z" level=info msg="StopPodSandbox for \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\"" Feb 12 19:45:57.653809 env[1337]: time="2024-02-12T19:45:57.653397678Z" level=info msg="TearDown network for sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" successfully" Feb 12 19:45:57.653809 env[1337]: time="2024-02-12T19:45:57.653439878Z" level=info msg="StopPodSandbox for \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" returns successfully" Feb 12 19:45:57.654368 env[1337]: time="2024-02-12T19:45:57.654325580Z" level=info msg="RemovePodSandbox for \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\"" Feb 12 19:45:57.654497 env[1337]: time="2024-02-12T19:45:57.654359580Z" level=info msg="Forcibly stopping sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\"" Feb 12 19:45:57.654497 env[1337]: time="2024-02-12T19:45:57.654438180Z" level=info msg="TearDown network for sandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" successfully" Feb 12 19:45:58.143415 env[1337]: time="2024-02-12T19:45:58.143359546Z" level=info msg="RemovePodSandbox \"4b141b3fa634356a80fda0e7db91bef89332705e41466d86bc525bae84ffaa6e\" returns successfully" Feb 12 19:45:58.146450 env[1337]: time="2024-02-12T19:45:58.146411552Z" level=info msg="StopPodSandbox for \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\"" Feb 12 19:45:58.146723 env[1337]: time="2024-02-12T19:45:58.146667152Z" level=info msg="TearDown network for sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" successfully" Feb 12 19:45:58.146850 env[1337]: time="2024-02-12T19:45:58.146827352Z" level=info msg="StopPodSandbox for \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" returns successfully" Feb 12 19:45:58.147338 env[1337]: time="2024-02-12T19:45:58.147307753Z" level=info msg="RemovePodSandbox for \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\"" Feb 12 19:45:58.147519 env[1337]: time="2024-02-12T19:45:58.147475554Z" level=info msg="Forcibly stopping sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\"" Feb 12 19:45:58.147698 env[1337]: time="2024-02-12T19:45:58.147639754Z" level=info msg="TearDown network for sandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" successfully" Feb 12 19:45:58.155124 env[1337]: time="2024-02-12T19:45:58.155093267Z" level=info msg="RemovePodSandbox \"206fdbfd914414ed0101aefb0cd491a3d5ab15115ed7f5c26ede23db6d32f60b\" returns successfully" Feb 12 19:46:00.679615 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 12 19:46:00.679789 kernel: audit: type=1400 audit(1707767160.652:1214): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.652000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.652000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879c60 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.724580 kernel: audit: type=1300 audit(1707767160.652:1214): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879c60 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.724692 kernel: audit: type=1327 audit(1707767160.652:1214): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.676000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.676000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879d80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.768256 kernel: audit: type=1400 audit(1707767160.676:1215): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.768345 kernel: audit: type=1300 audit(1707767160.676:1215): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879d80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.788394 kernel: audit: type=1327 audit(1707767160.676:1215): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.676000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.807597 kernel: audit: type=1400 audit(1707767160.676:1216): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.676000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879da0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.833881 kernel: audit: type=1300 audit(1707767160.676:1216): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002879da0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.855885 kernel: audit: type=1327 audit(1707767160.676:1216): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.677000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:00.677000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d189c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:00.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:00.875874 kernel: audit: type=1400 audit(1707767160.677:1217): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:01.471946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1523485537.mount: Deactivated successfully. Feb 12 19:46:01.581104 env[1337]: time="2024-02-12T19:46:01.581053469Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:01.586153 env[1337]: time="2024-02-12T19:46:01.586115678Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:01.590021 env[1337]: time="2024-02-12T19:46:01.589986384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:01.592691 env[1337]: time="2024-02-12T19:46:01.592654089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:01.593157 env[1337]: time="2024-02-12T19:46:01.593125190Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:46:01.610386 env[1337]: time="2024-02-12T19:46:01.610346320Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:46:01.631206 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3935536347.mount: Deactivated successfully. Feb 12 19:46:01.644922 env[1337]: time="2024-02-12T19:46:01.644882480Z" level=info msg="CreateContainer within sandbox \"ea76f7b8e779e173cafc18a6b30ea8859993f549514f968f935e137163cf09b2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad\"" Feb 12 19:46:01.647109 env[1337]: time="2024-02-12T19:46:01.645476881Z" level=info msg="StartContainer for \"594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad\"" Feb 12 19:46:01.662966 systemd[1]: Started cri-containerd-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad.scope. Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f52e0a31c28 items=0 ppid=3474 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:01.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539346234366661303831346637346666383031613338393163663538 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit: BPF prog-id=155 op=LOAD Feb 12 19:46:01.682000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b7488 items=0 ppid=3474 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:01.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539346234366661303831346637346666383031613338393163663538 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit: BPF prog-id=156 op=LOAD Feb 12 19:46:01.682000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b74d8 items=0 ppid=3474 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:01.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539346234366661303831346637346666383031613338393163663538 Feb 12 19:46:01.682000 audit: BPF prog-id=156 op=UNLOAD Feb 12 19:46:01.682000 audit: BPF prog-id=155 op=UNLOAD Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:01.682000 audit: BPF prog-id=157 op=LOAD Feb 12 19:46:01.682000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b7568 items=0 ppid=3474 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:01.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539346234366661303831346637346666383031613338393163663538 Feb 12 19:46:01.701510 env[1337]: time="2024-02-12T19:46:01.701477578Z" level=info msg="StartContainer for \"594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad\" returns successfully" Feb 12 19:46:01.916138 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:46:01.916338 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:46:03.283000 audit[4000]: AVC avc: denied { write } for pid=4000 comm="tee" name="fd" dev="proc" ino=32598 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.283000 audit[4000]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe536f7979 a2=241 a3=1b6 items=1 ppid=3966 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.283000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:46:03.298000 audit[4008]: AVC avc: denied { write } for pid=4008 comm="tee" name="fd" dev="proc" ino=32610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.283000 audit: PATH item=0 name="/dev/fd/63" inode=32570 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.283000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.301000 audit[4021]: AVC avc: denied { write } for pid=4021 comm="tee" name="fd" dev="proc" ino=32615 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.298000 audit[4008]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6c5ce97a a2=241 a3=1b6 items=1 ppid=3976 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.298000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:46:03.298000 audit: PATH item=0 name="/dev/fd/63" inode=32583 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.298000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.307000 audit[4017]: AVC avc: denied { write } for pid=4017 comm="tee" name="fd" dev="proc" ino=32618 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.307000 audit[4017]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbe61e97b a2=241 a3=1b6 items=1 ppid=3973 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.307000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:46:03.307000 audit: PATH item=0 name="/dev/fd/63" inode=32593 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.311000 audit[4027]: AVC avc: denied { write } for pid=4027 comm="tee" name="fd" dev="proc" ino=32622 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.301000 audit[4021]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe30e02979 a2=241 a3=1b6 items=1 ppid=3981 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.301000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:46:03.301000 audit: PATH item=0 name="/dev/fd/63" inode=32601 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.301000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.324000 audit[4033]: AVC avc: denied { write } for pid=4033 comm="tee" name="fd" dev="proc" ino=32634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.311000 audit[4027]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc5a33979 a2=241 a3=1b6 items=1 ppid=3978 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.311000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:46:03.311000 audit: PATH item=0 name="/dev/fd/63" inode=32604 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.311000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.324000 audit[4033]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4c953969 a2=241 a3=1b6 items=1 ppid=3970 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.324000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:46:03.324000 audit: PATH item=0 name="/dev/fd/63" inode=32617 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.353000 audit[4043]: AVC avc: denied { write } for pid=4043 comm="tee" name="fd" dev="proc" ino=32638 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:46:03.353000 audit[4043]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3016496a a2=241 a3=1b6 items=1 ppid=3969 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.353000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:46:03.353000 audit: PATH item=0 name="/dev/fd/63" inode=32635 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:03.353000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit: BPF prog-id=158 op=LOAD Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1bb08d60 a2=70 a3=7f6e6143a000 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit: BPF prog-id=159 op=LOAD Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd1bb08d60 a2=70 a3=6e items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit: BPF prog-id=159 op=UNLOAD Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd1bb08d10 a2=70 a3=7ffd1bb08d60 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit: BPF prog-id=160 op=LOAD Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd1bb08cf0 a2=70 a3=7ffd1bb08d60 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit: BPF prog-id=160 op=UNLOAD Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1bb08dd0 a2=70 a3=0 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd1bb08dc0 a2=70 a3=0 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.698000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.698000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd1bb08e00 a2=70 a3=0 items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.698000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.699000 audit: BPF prog-id=161 op=LOAD Feb 12 19:46:03.699000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd1bb08d20 a2=70 a3=ffffffff items=0 ppid=3979 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.699000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:46:03.703000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.703000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc30415e0 a2=70 a3=fff80800 items=0 ppid=3979 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:46:03.703000 audit[4106]: AVC avc: denied { bpf } for pid=4106 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:03.703000 audit[4106]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffc30414b0 a2=70 a3=3 items=0 ppid=3979 pid=4106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:46:03.708000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:46:03.708000 audit[4102]: SYSCALL arch=c000003e syscall=262 success=yes exit=0 a0=4 a1=7f319c4c6c75 a2=7ffd601bb2f0 a3=1000 items=0 ppid=3890 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-sysctl" exe="/usr/lib/systemd/systemd-sysctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.708000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D73797363746C002D2D7072656669783D6E65742F697076342F636F6E662F63616C69636F5F746D705F4200002D2D7072656669783D6E65742F697076342F6E656967682F63616C69636F5F746D705F4200002D2D7072656669783D6E65742F697076362F636F6E Feb 12 19:46:03.808000 audit[4132]: NETFILTER_CFG table=mangle:107 family=2 entries=19 op=nft_register_chain pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:03.808000 audit[4132]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc596086c0 a2=0 a3=7ffc596086ac items=0 ppid=3979 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.808000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:03.816000 audit[4133]: NETFILTER_CFG table=nat:108 family=2 entries=16 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:03.816000 audit[4133]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd565340d0 a2=0 a3=55e3d4764000 items=0 ppid=3979 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.816000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:03.821000 audit[4136]: NETFILTER_CFG table=filter:109 family=2 entries=39 op=nft_register_chain pid=4136 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:03.821000 audit[4136]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe63367070 a2=0 a3=7ffe6336705c items=0 ppid=3979 pid=4136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:03.823000 audit[4131]: NETFILTER_CFG table=raw:110 family=2 entries=19 op=nft_register_chain pid=4131 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:03.823000 audit[4131]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcdd9d64f0 a2=0 a3=564ab1a66000 items=0 ppid=3979 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:03.823000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:04.618661 systemd-networkd[1484]: vxlan.calico: Link UP Feb 12 19:46:04.618671 systemd-networkd[1484]: vxlan.calico: Gained carrier Feb 12 19:46:04.666192 env[1337]: time="2024-02-12T19:46:04.666136486Z" level=info msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" Feb 12 19:46:04.706394 kubelet[2467]: I0212 19:46:04.705696 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jdxzs" podStartSLOduration=7.885129607 podCreationTimestamp="2024-02-12 19:45:29 +0000 UTC" firstStartedPulling="2024-02-12 19:45:33.772917843 +0000 UTC m=+36.244664851" lastFinishedPulling="2024-02-12 19:46:01.59343529 +0000 UTC m=+64.065182298" observedRunningTime="2024-02-12 19:46:01.883454394 +0000 UTC m=+64.355201402" watchObservedRunningTime="2024-02-12 19:46:04.705647054 +0000 UTC m=+67.177393962" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] k8s.go 578: Cleaning up netns ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" iface="eth0" netns="/var/run/netns/cni-ae43dbe1-4d35-24fc-4445-5e333b279b0b" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" iface="eth0" netns="/var/run/netns/cni-ae43dbe1-4d35-24fc-4445-5e333b279b0b" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" iface="eth0" netns="/var/run/netns/cni-ae43dbe1-4d35-24fc-4445-5e333b279b0b" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] k8s.go 585: Releasing IP address(es) ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.704 [INFO][4157] utils.go 188: Calico CNI releasing IP address ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.725 [INFO][4164] ipam_plugin.go 415: Releasing address using handleID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.725 [INFO][4164] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.725 [INFO][4164] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.730 [WARNING][4164] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.731 [INFO][4164] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.732 [INFO][4164] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:04.734435 env[1337]: 2024-02-12 19:46:04.733 [INFO][4157] k8s.go 591: Teardown processing complete. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:04.735830 env[1337]: time="2024-02-12T19:46:04.735771905Z" level=info msg="TearDown network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" successfully" Feb 12 19:46:04.735999 env[1337]: time="2024-02-12T19:46:04.735976505Z" level=info msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" returns successfully" Feb 12 19:46:04.739176 systemd[1]: run-netns-cni\x2dae43dbe1\x2d4d35\x2d24fc\x2d4445\x2d5e333b279b0b.mount: Deactivated successfully. Feb 12 19:46:04.740339 env[1337]: time="2024-02-12T19:46:04.740292313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nrbjz,Uid:0b46e87c-b59c-4353-8a23-d46d6d006b74,Namespace:kube-system,Attempt:1,}" Feb 12 19:46:04.883294 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:46:04.883415 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64114f49b21: link becomes ready Feb 12 19:46:04.873017 systemd-networkd[1484]: cali64114f49b21: Link UP Feb 12 19:46:04.884157 systemd-networkd[1484]: cali64114f49b21: Gained carrier Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.813 [INFO][4171] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0 coredns-5dd5756b68- kube-system 0b46e87c-b59c-4353-8a23-d46d6d006b74 846 0 2024-02-12 19:45:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b coredns-5dd5756b68-nrbjz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali64114f49b21 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.813 [INFO][4171] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.838 [INFO][4183] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" HandleID="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.846 [INFO][4183] ipam_plugin.go 268: Auto assigning IP ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" HandleID="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1c40), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"coredns-5dd5756b68-nrbjz", "timestamp":"2024-02-12 19:46:04.838328981 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.846 [INFO][4183] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.846 [INFO][4183] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.846 [INFO][4183] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.848 [INFO][4183] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.851 [INFO][4183] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.855 [INFO][4183] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.856 [INFO][4183] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.858 [INFO][4183] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.858 [INFO][4183] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.860 [INFO][4183] ipam.go 1682: Creating new handle: k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524 Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.862 [INFO][4183] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.867 [INFO][4183] ipam.go 1216: Successfully claimed IPs: [192.168.34.129/26] block=192.168.34.128/26 handle="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.867 [INFO][4183] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.129/26] handle="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.867 [INFO][4183] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:04.902625 env[1337]: 2024-02-12 19:46:04.867 [INFO][4183] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.129/26] IPv6=[] ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" HandleID="k8s-pod-network.e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.870 [INFO][4171] k8s.go 385: Populated endpoint ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"0b46e87c-b59c-4353-8a23-d46d6d006b74", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"coredns-5dd5756b68-nrbjz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64114f49b21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.871 [INFO][4171] k8s.go 386: Calico CNI using IPs: [192.168.34.129/32] ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.871 [INFO][4171] dataplane_linux.go 68: Setting the host side veth name to cali64114f49b21 ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.885 [INFO][4171] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.892 [INFO][4171] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"0b46e87c-b59c-4353-8a23-d46d6d006b74", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524", Pod:"coredns-5dd5756b68-nrbjz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64114f49b21", MAC:"9a:56:5d:08:54:ff", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:04.903581 env[1337]: 2024-02-12 19:46:04.899 [INFO][4171] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524" Namespace="kube-system" Pod="coredns-5dd5756b68-nrbjz" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:04.928312 env[1337]: time="2024-02-12T19:46:04.928245535Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:04.928477 env[1337]: time="2024-02-12T19:46:04.928290635Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:04.928477 env[1337]: time="2024-02-12T19:46:04.928306035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:04.928631 env[1337]: time="2024-02-12T19:46:04.928473335Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524 pid=4209 runtime=io.containerd.runc.v2 Feb 12 19:46:04.944000 audit[4226]: NETFILTER_CFG table=filter:111 family=2 entries=36 op=nft_register_chain pid=4226 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:04.944000 audit[4226]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc438aaa30 a2=0 a3=7ffc438aaa1c items=0 ppid=3979 pid=4226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.944000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:04.958260 systemd[1]: Started cri-containerd-e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524.scope. Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.969000 audit: BPF prog-id=162 op=LOAD Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4209 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353430373362303632343837306236303631336531646565313639 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4209 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353430373362303632343837306236303631336531646565313639 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit: BPF prog-id=163 op=LOAD Feb 12 19:46:04.970000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f5fc0 items=0 ppid=4209 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353430373362303632343837306236303631336531646565313639 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit: BPF prog-id=164 op=LOAD Feb 12 19:46:04.970000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e8008 items=0 ppid=4209 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353430373362303632343837306236303631336531646565313639 Feb 12 19:46:04.970000 audit: BPF prog-id=164 op=UNLOAD Feb 12 19:46:04.970000 audit: BPF prog-id=163 op=UNLOAD Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { perfmon } for pid=4220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit[4220]: AVC avc: denied { bpf } for pid=4220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:04.970000 audit: BPF prog-id=165 op=LOAD Feb 12 19:46:04.970000 audit[4220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8418 items=0 ppid=4209 pid=4220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:04.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538353430373362303632343837306236303631336531646565313639 Feb 12 19:46:04.998372 env[1337]: time="2024-02-12T19:46:04.998322655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-nrbjz,Uid:0b46e87c-b59c-4353-8a23-d46d6d006b74,Namespace:kube-system,Attempt:1,} returns sandbox id \"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524\"" Feb 12 19:46:05.002934 env[1337]: time="2024-02-12T19:46:05.002603862Z" level=info msg="CreateContainer within sandbox \"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:46:05.041794 env[1337]: time="2024-02-12T19:46:05.041732829Z" level=info msg="CreateContainer within sandbox \"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"374e94e38a800efb9453a8f272b62b50a97be7485cc922d823b62d9c7bdfb535\"" Feb 12 19:46:05.043937 env[1337]: time="2024-02-12T19:46:05.042315230Z" level=info msg="StartContainer for \"374e94e38a800efb9453a8f272b62b50a97be7485cc922d823b62d9c7bdfb535\"" Feb 12 19:46:05.059347 systemd[1]: Started cri-containerd-374e94e38a800efb9453a8f272b62b50a97be7485cc922d823b62d9c7bdfb535.scope. Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.074000 audit: BPF prog-id=166 op=LOAD Feb 12 19:46:05.075000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.075000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4209 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337346539346533386138303065666239343533613866323732623632 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4209 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337346539346533386138303065666239343533613866323732623632 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit: BPF prog-id=167 op=LOAD Feb 12 19:46:05.076000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6e80 items=0 ppid=4209 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337346539346533386138303065666239343533613866323732623632 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit: BPF prog-id=168 op=LOAD Feb 12 19:46:05.076000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a6ec8 items=0 ppid=4209 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337346539346533386138303065666239343533613866323732623632 Feb 12 19:46:05.076000 audit: BPF prog-id=168 op=UNLOAD Feb 12 19:46:05.076000 audit: BPF prog-id=167 op=UNLOAD Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { perfmon } for pid=4253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit[4253]: AVC avc: denied { bpf } for pid=4253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:05.076000 audit: BPF prog-id=169 op=LOAD Feb 12 19:46:05.076000 audit[4253]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a72d8 items=0 ppid=4209 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337346539346533386138303065666239343533613866323732623632 Feb 12 19:46:05.094588 env[1337]: time="2024-02-12T19:46:05.094536619Z" level=info msg="StartContainer for \"374e94e38a800efb9453a8f272b62b50a97be7485cc922d823b62d9c7bdfb535\" returns successfully" Feb 12 19:46:05.667594 env[1337]: time="2024-02-12T19:46:05.667544395Z" level=info msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" Feb 12 19:46:05.669383 env[1337]: time="2024-02-12T19:46:05.667945996Z" level=info msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.784 [INFO][4315] k8s.go 578: Cleaning up netns ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.784 [INFO][4315] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" iface="eth0" netns="/var/run/netns/cni-582d24d2-bd05-cf62-28d0-a31b8a265295" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.785 [INFO][4315] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" iface="eth0" netns="/var/run/netns/cni-582d24d2-bd05-cf62-28d0-a31b8a265295" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.785 [INFO][4315] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" iface="eth0" netns="/var/run/netns/cni-582d24d2-bd05-cf62-28d0-a31b8a265295" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.785 [INFO][4315] k8s.go 585: Releasing IP address(es) ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.785 [INFO][4315] utils.go 188: Calico CNI releasing IP address ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.872 [INFO][4326] ipam_plugin.go 415: Releasing address using handleID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.873 [INFO][4326] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.873 [INFO][4326] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.883 [WARNING][4326] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.883 [INFO][4326] ipam_plugin.go 443: Releasing address using workloadID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.885 [INFO][4326] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:05.891482 env[1337]: 2024-02-12 19:46:05.887 [INFO][4315] k8s.go 591: Teardown processing complete. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:05.891262 systemd[1]: run-netns-cni\x2d582d24d2\x2dbd05\x2dcf62\x2d28d0\x2da31b8a265295.mount: Deactivated successfully. Feb 12 19:46:05.892434 env[1337]: time="2024-02-12T19:46:05.892341178Z" level=info msg="TearDown network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" successfully" Feb 12 19:46:05.892434 env[1337]: time="2024-02-12T19:46:05.892378078Z" level=info msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" returns successfully" Feb 12 19:46:05.895419 env[1337]: time="2024-02-12T19:46:05.895387183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5cvhk,Uid:3dfb911a-daee-409f-82ae-6be195f7e89b,Namespace:kube-system,Attempt:1,}" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] k8s.go 578: Cleaning up netns ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" iface="eth0" netns="/var/run/netns/cni-9f5e75f0-eb57-80c8-a034-7109f5a932ae" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" iface="eth0" netns="/var/run/netns/cni-9f5e75f0-eb57-80c8-a034-7109f5a932ae" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" iface="eth0" netns="/var/run/netns/cni-9f5e75f0-eb57-80c8-a034-7109f5a932ae" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] k8s.go 585: Releasing IP address(es) ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.786 [INFO][4314] utils.go 188: Calico CNI releasing IP address ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.871 [INFO][4327] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.873 [INFO][4327] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.885 [INFO][4327] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.900 [WARNING][4327] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.900 [INFO][4327] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.909 [INFO][4327] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:05.911707 env[1337]: 2024-02-12 19:46:05.910 [INFO][4314] k8s.go 591: Teardown processing complete. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:05.914678 systemd[1]: run-netns-cni\x2d9f5e75f0\x2deb57\x2d80c8\x2da034\x2d7109f5a932ae.mount: Deactivated successfully. Feb 12 19:46:05.915750 env[1337]: time="2024-02-12T19:46:05.915710918Z" level=info msg="TearDown network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" successfully" Feb 12 19:46:05.915902 env[1337]: time="2024-02-12T19:46:05.915749818Z" level=info msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" returns successfully" Feb 12 19:46:05.916485 env[1337]: time="2024-02-12T19:46:05.916448819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784b5bcdbd-xqxrj,Uid:6aa62b87-34ad-4d93-b5f8-e9e7359629b3,Namespace:calico-system,Attempt:1,}" Feb 12 19:46:05.921130 kubelet[2467]: I0212 19:46:05.921048 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-nrbjz" podStartSLOduration=54.920979527 podCreationTimestamp="2024-02-12 19:45:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:46:05.897922388 +0000 UTC m=+68.369669296" watchObservedRunningTime="2024-02-12 19:46:05.920979527 +0000 UTC m=+68.392726535" Feb 12 19:46:05.934000 audit[4340]: NETFILTER_CFG table=filter:112 family=2 entries=14 op=nft_register_rule pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.940152 kernel: kauditd_printk_skb: 282 callbacks suppressed Feb 12 19:46:05.940235 kernel: audit: type=1325 audit(1707767165.934:1286): table=filter:112 family=2 entries=14 op=nft_register_rule pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.934000 audit[4340]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffda3c34c0 a2=0 a3=7fffda3c34ac items=0 ppid=2616 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:05.980425 kernel: audit: type=1300 audit(1707767165.934:1286): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fffda3c34c0 a2=0 a3=7fffda3c34ac items=0 ppid=2616 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.980548 kernel: audit: type=1327 audit(1707767165.934:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:05.980000 audit[4340]: NETFILTER_CFG table=nat:113 family=2 entries=14 op=nft_register_rule pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.992945 kernel: audit: type=1325 audit(1707767165.980:1287): table=nat:113 family=2 entries=14 op=nft_register_rule pid=4340 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.980000 audit[4340]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fffda3c34c0 a2=0 a3=31030 items=0 ppid=2616 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.017891 kernel: audit: type=1300 audit(1707767165.980:1287): arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fffda3c34c0 a2=0 a3=31030 items=0 ppid=2616 pid=4340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.033193 kernel: audit: type=1327 audit(1707767165.980:1287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:05.992000 audit[4342]: NETFILTER_CFG table=filter:114 family=2 entries=11 op=nft_register_rule pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:06.053002 kernel: audit: type=1325 audit(1707767165.992:1288): table=filter:114 family=2 entries=11 op=nft_register_rule pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.992000 audit[4342]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdbec291c0 a2=0 a3=7ffdbec291ac items=0 ppid=2616 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.078955 kernel: audit: type=1300 audit(1707767165.992:1288): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdbec291c0 a2=0 a3=7ffdbec291ac items=0 ppid=2616 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.102168 kernel: audit: type=1327 audit(1707767165.992:1288): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.102344 kernel: audit: type=1325 audit(1707767165.992:1289): table=nat:115 family=2 entries=35 op=nft_register_chain pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.992000 audit[4342]: NETFILTER_CFG table=nat:115 family=2 entries=35 op=nft_register_chain pid=4342 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:05.992000 audit[4342]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdbec291c0 a2=0 a3=7ffdbec291ac items=0 ppid=2616 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:05.992000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.122153 systemd-networkd[1484]: cali64114f49b21: Gained IPv6LL Feb 12 19:46:06.122531 systemd-networkd[1484]: vxlan.calico: Gained IPv6LL Feb 12 19:46:06.202667 systemd-networkd[1484]: calicc157556c8a: Link UP Feb 12 19:46:06.210328 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:46:06.216888 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc157556c8a: link becomes ready Feb 12 19:46:06.217372 systemd-networkd[1484]: calicc157556c8a: Gained carrier Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.124 [INFO][4356] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0 calico-kube-controllers-784b5bcdbd- calico-system 6aa62b87-34ad-4d93-b5f8-e9e7359629b3 860 0 2024-02-12 19:45:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:784b5bcdbd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b calico-kube-controllers-784b5bcdbd-xqxrj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calicc157556c8a [] []}} ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.124 [INFO][4356] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.161 [INFO][4374] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" HandleID="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.173 [INFO][4374] ipam_plugin.go 268: Auto assigning IP ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" HandleID="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cab0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"calico-kube-controllers-784b5bcdbd-xqxrj", "timestamp":"2024-02-12 19:46:06.161328335 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.173 [INFO][4374] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.173 [INFO][4374] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.173 [INFO][4374] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.176 [INFO][4374] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.179 [INFO][4374] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.183 [INFO][4374] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.184 [INFO][4374] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.186 [INFO][4374] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.186 [INFO][4374] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.188 [INFO][4374] ipam.go 1682: Creating new handle: k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.191 [INFO][4374] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.195 [INFO][4374] ipam.go 1216: Successfully claimed IPs: [192.168.34.130/26] block=192.168.34.128/26 handle="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.195 [INFO][4374] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.130/26] handle="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.195 [INFO][4374] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:06.229373 env[1337]: 2024-02-12 19:46:06.195 [INFO][4374] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.130/26] IPv6=[] ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" HandleID="k8s-pod-network.e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.196 [INFO][4356] k8s.go 385: Populated endpoint ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0", GenerateName:"calico-kube-controllers-784b5bcdbd-", Namespace:"calico-system", SelfLink:"", UID:"6aa62b87-34ad-4d93-b5f8-e9e7359629b3", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784b5bcdbd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"calico-kube-controllers-784b5bcdbd-xqxrj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc157556c8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.196 [INFO][4356] k8s.go 386: Calico CNI using IPs: [192.168.34.130/32] ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.196 [INFO][4356] dataplane_linux.go 68: Setting the host side veth name to calicc157556c8a ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.218 [INFO][4356] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.218 [INFO][4356] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0", GenerateName:"calico-kube-controllers-784b5bcdbd-", Namespace:"calico-system", SelfLink:"", UID:"6aa62b87-34ad-4d93-b5f8-e9e7359629b3", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784b5bcdbd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce", Pod:"calico-kube-controllers-784b5bcdbd-xqxrj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc157556c8a", MAC:"16:f8:67:12:2e:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.230339 env[1337]: 2024-02-12 19:46:06.227 [INFO][4356] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce" Namespace="calico-system" Pod="calico-kube-controllers-784b5bcdbd-xqxrj" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:06.251093 env[1337]: time="2024-02-12T19:46:06.251019188Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:06.251240 env[1337]: time="2024-02-12T19:46:06.251083988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:06.251240 env[1337]: time="2024-02-12T19:46:06.251104188Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:06.251364 env[1337]: time="2024-02-12T19:46:06.251272288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce pid=4404 runtime=io.containerd.runc.v2 Feb 12 19:46:06.260217 systemd-networkd[1484]: cali64521ac11dd: Link UP Feb 12 19:46:06.275907 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali64521ac11dd: link becomes ready Feb 12 19:46:06.276508 systemd-networkd[1484]: cali64521ac11dd: Gained carrier Feb 12 19:46:06.279077 systemd[1]: Started cri-containerd-e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce.scope. Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.105 [INFO][4343] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0 coredns-5dd5756b68- kube-system 3dfb911a-daee-409f-82ae-6be195f7e89b 859 0 2024-02-12 19:45:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b coredns-5dd5756b68-5cvhk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali64521ac11dd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.106 [INFO][4343] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.159 [INFO][4368] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" HandleID="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.174 [INFO][4368] ipam_plugin.go 268: Auto assigning IP ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" HandleID="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002befe0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"coredns-5dd5756b68-5cvhk", "timestamp":"2024-02-12 19:46:06.159076732 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.174 [INFO][4368] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.197 [INFO][4368] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.198 [INFO][4368] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.200 [INFO][4368] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.221 [INFO][4368] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.224 [INFO][4368] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.231 [INFO][4368] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.234 [INFO][4368] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.234 [INFO][4368] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.235 [INFO][4368] ipam.go 1682: Creating new handle: k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50 Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.242 [INFO][4368] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.254 [INFO][4368] ipam.go 1216: Successfully claimed IPs: [192.168.34.131/26] block=192.168.34.128/26 handle="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.254 [INFO][4368] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.131/26] handle="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.254 [INFO][4368] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:06.299297 env[1337]: 2024-02-12 19:46:06.254 [INFO][4368] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.131/26] IPv6=[] ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" HandleID="k8s-pod-network.da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.257 [INFO][4343] k8s.go 385: Populated endpoint ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3dfb911a-daee-409f-82ae-6be195f7e89b", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"coredns-5dd5756b68-5cvhk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64521ac11dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.257 [INFO][4343] k8s.go 386: Calico CNI using IPs: [192.168.34.131/32] ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.258 [INFO][4343] dataplane_linux.go 68: Setting the host side veth name to cali64521ac11dd ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.276 [INFO][4343] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.285 [INFO][4343] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3dfb911a-daee-409f-82ae-6be195f7e89b", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50", Pod:"coredns-5dd5756b68-5cvhk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64521ac11dd", MAC:"ca:ef:fa:e1:ac:bf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.300323 env[1337]: 2024-02-12 19:46:06.297 [INFO][4343] k8s.go 491: Wrote updated endpoint to datastore ContainerID="da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50" Namespace="kube-system" Pod="coredns-5dd5756b68-5cvhk" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:06.301000 audit[4427]: NETFILTER_CFG table=filter:116 family=2 entries=40 op=nft_register_chain pid=4427 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:06.301000 audit[4427]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffd15a845b0 a2=0 a3=7ffd15a8459c items=0 ppid=3979 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.301000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.320000 audit: BPF prog-id=170 op=LOAD Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4404 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343633316464313031643933323535343163333666653737643533 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4404 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343633316464313031643933323535343163333666653737643533 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.322000 audit: BPF prog-id=171 op=LOAD Feb 12 19:46:06.322000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024790 items=0 ppid=4404 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343633316464313031643933323535343163333666653737643533 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.324000 audit: BPF prog-id=172 op=LOAD Feb 12 19:46:06.324000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000247d8 items=0 ppid=4404 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343633316464313031643933323535343163333666653737643533 Feb 12 19:46:06.325000 audit: BPF prog-id=172 op=UNLOAD Feb 12 19:46:06.325000 audit: BPF prog-id=171 op=UNLOAD Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.325000 audit: BPF prog-id=173 op=LOAD Feb 12 19:46:06.325000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024be8 items=0 ppid=4404 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343633316464313031643933323535343163333666653737643533 Feb 12 19:46:06.330488 env[1337]: time="2024-02-12T19:46:06.330425022Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:06.330642 env[1337]: time="2024-02-12T19:46:06.330619223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:06.330749 env[1337]: time="2024-02-12T19:46:06.330731423Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:06.331050 env[1337]: time="2024-02-12T19:46:06.330987823Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50 pid=4451 runtime=io.containerd.runc.v2 Feb 12 19:46:06.346520 systemd[1]: Started cri-containerd-da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50.scope. Feb 12 19:46:06.359000 audit[4473]: NETFILTER_CFG table=filter:117 family=2 entries=40 op=nft_register_chain pid=4473 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:06.359000 audit[4473]: SYSCALL arch=c000003e syscall=46 success=yes exit=20752 a0=3 a1=7ffc2ca76e20 a2=0 a3=7ffc2ca76e0c items=0 ppid=3979 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.359000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.371000 audit: BPF prog-id=174 op=LOAD Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333232336337343035643961663837313336626432346336363565 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333232336337343035643961663837313336626432346336363565 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.372000 audit: BPF prog-id=175 op=LOAD Feb 12 19:46:06.372000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000349ce0 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333232336337343035643961663837313336626432346336363565 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.374000 audit: BPF prog-id=176 op=LOAD Feb 12 19:46:06.374000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000349d28 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333232336337343035643961663837313336626432346336363565 Feb 12 19:46:06.375000 audit: BPF prog-id=176 op=UNLOAD Feb 12 19:46:06.375000 audit: BPF prog-id=175 op=UNLOAD Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.375000 audit: BPF prog-id=177 op=LOAD Feb 12 19:46:06.375000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ca138 items=0 ppid=4451 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461333232336337343035643961663837313336626432346336363565 Feb 12 19:46:06.414851 env[1337]: time="2024-02-12T19:46:06.414797066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-784b5bcdbd-xqxrj,Uid:6aa62b87-34ad-4d93-b5f8-e9e7359629b3,Namespace:calico-system,Attempt:1,} returns sandbox id \"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce\"" Feb 12 19:46:06.418755 env[1337]: time="2024-02-12T19:46:06.416681269Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-5cvhk,Uid:3dfb911a-daee-409f-82ae-6be195f7e89b,Namespace:kube-system,Attempt:1,} returns sandbox id \"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50\"" Feb 12 19:46:06.418983 env[1337]: time="2024-02-12T19:46:06.416981769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:46:06.424007 env[1337]: time="2024-02-12T19:46:06.423975781Z" level=info msg="CreateContainer within sandbox \"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:46:06.468242 env[1337]: time="2024-02-12T19:46:06.463052747Z" level=info msg="CreateContainer within sandbox \"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"63a04b5764a50a995d3aaffd8d92cd5b2bae5b60d2cf9d820479bd170be76f26\"" Feb 12 19:46:06.468242 env[1337]: time="2024-02-12T19:46:06.468064656Z" level=info msg="StartContainer for \"63a04b5764a50a995d3aaffd8d92cd5b2bae5b60d2cf9d820479bd170be76f26\"" Feb 12 19:46:06.485001 systemd[1]: Started cri-containerd-63a04b5764a50a995d3aaffd8d92cd5b2bae5b60d2cf9d820479bd170be76f26.scope. Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.499000 audit: BPF prog-id=178 op=LOAD Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4451 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613034623537363461353061393935643361616666643864393263 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=4451 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613034623537363461353061393935643361616666643864393263 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit: BPF prog-id=179 op=LOAD Feb 12 19:46:06.500000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0002e7de0 items=0 ppid=4451 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613034623537363461353061393935643361616666643864393263 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit: BPF prog-id=180 op=LOAD Feb 12 19:46:06.500000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0002e7e28 items=0 ppid=4451 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613034623537363461353061393935643361616666643864393263 Feb 12 19:46:06.500000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:46:06.500000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { perfmon } for pid=4503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit[4503]: AVC avc: denied { bpf } for pid=4503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:06.500000 audit: BPF prog-id=181 op=LOAD Feb 12 19:46:06.500000 audit[4503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003aa238 items=0 ppid=4451 pid=4503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633613034623537363461353061393935643361616666643864393263 Feb 12 19:46:06.519755 env[1337]: time="2024-02-12T19:46:06.519720244Z" level=info msg="StartContainer for \"63a04b5764a50a995d3aaffd8d92cd5b2bae5b60d2cf9d820479bd170be76f26\" returns successfully" Feb 12 19:46:06.665967 env[1337]: time="2024-02-12T19:46:06.665894492Z" level=info msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.704 [INFO][4548] k8s.go 578: Cleaning up netns ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.705 [INFO][4548] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" iface="eth0" netns="/var/run/netns/cni-bc310088-ef57-cd52-01d3-1c116776d38f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.705 [INFO][4548] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" iface="eth0" netns="/var/run/netns/cni-bc310088-ef57-cd52-01d3-1c116776d38f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.705 [INFO][4548] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" iface="eth0" netns="/var/run/netns/cni-bc310088-ef57-cd52-01d3-1c116776d38f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.705 [INFO][4548] k8s.go 585: Releasing IP address(es) ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.705 [INFO][4548] utils.go 188: Calico CNI releasing IP address ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.723 [INFO][4554] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.723 [INFO][4554] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.724 [INFO][4554] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.729 [WARNING][4554] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.729 [INFO][4554] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.731 [INFO][4554] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:06.734308 env[1337]: 2024-02-12 19:46:06.731 [INFO][4548] k8s.go 591: Teardown processing complete. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:06.734308 env[1337]: time="2024-02-12T19:46:06.733271806Z" level=info msg="TearDown network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" successfully" Feb 12 19:46:06.734308 env[1337]: time="2024-02-12T19:46:06.733371206Z" level=info msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" returns successfully" Feb 12 19:46:06.741653 systemd[1]: run-netns-cni\x2dbc310088\x2def57\x2dcd52\x2d01d3\x2d1c116776d38f.mount: Deactivated successfully. Feb 12 19:46:06.742814 env[1337]: time="2024-02-12T19:46:06.742773522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qm5rg,Uid:a6c5fdf4-4e55-49cb-827f-7effd0243382,Namespace:calico-system,Attempt:1,}" Feb 12 19:46:06.891109 systemd-networkd[1484]: calic301b7ead95: Link UP Feb 12 19:46:06.901593 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic301b7ead95: link becomes ready Feb 12 19:46:06.901023 systemd-networkd[1484]: calic301b7ead95: Gained carrier Feb 12 19:46:06.915122 kubelet[2467]: I0212 19:46:06.914938 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-5cvhk" podStartSLOduration=55.914878414 podCreationTimestamp="2024-02-12 19:45:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:46:06.889785571 +0000 UTC m=+69.361532579" watchObservedRunningTime="2024-02-12 19:46:06.914878414 +0000 UTC m=+69.386625422" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.817 [INFO][4561] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0 csi-node-driver- calico-system a6c5fdf4-4e55-49cb-827f-7effd0243382 880 0 2024-02-12 19:45:18 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b csi-node-driver-qm5rg eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic301b7ead95 [] []}} ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.817 [INFO][4561] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.843 [INFO][4573] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" HandleID="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.851 [INFO][4573] ipam_plugin.go 268: Auto assigning IP ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" HandleID="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ca90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"csi-node-driver-qm5rg", "timestamp":"2024-02-12 19:46:06.843346593 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.851 [INFO][4573] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.851 [INFO][4573] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.851 [INFO][4573] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.853 [INFO][4573] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.856 [INFO][4573] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.859 [INFO][4573] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.860 [INFO][4573] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.862 [INFO][4573] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.862 [INFO][4573] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.863 [INFO][4573] ipam.go 1682: Creating new handle: k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92 Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.866 [INFO][4573] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.876 [INFO][4573] ipam.go 1216: Successfully claimed IPs: [192.168.34.132/26] block=192.168.34.128/26 handle="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.876 [INFO][4573] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.132/26] handle="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.876 [INFO][4573] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:06.924725 env[1337]: 2024-02-12 19:46:06.876 [INFO][4573] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.132/26] IPv6=[] ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" HandleID="k8s-pod-network.4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.886 [INFO][4561] k8s.go 385: Populated endpoint ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6c5fdf4-4e55-49cb-827f-7effd0243382", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"csi-node-driver-qm5rg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic301b7ead95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.886 [INFO][4561] k8s.go 386: Calico CNI using IPs: [192.168.34.132/32] ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.886 [INFO][4561] dataplane_linux.go 68: Setting the host side veth name to calic301b7ead95 ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.902 [INFO][4561] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.903 [INFO][4561] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6c5fdf4-4e55-49cb-827f-7effd0243382", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92", Pod:"csi-node-driver-qm5rg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic301b7ead95", MAC:"ee:df:85:37:ca:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:06.925690 env[1337]: 2024-02-12 19:46:06.922 [INFO][4561] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92" Namespace="calico-system" Pod="csi-node-driver-qm5rg" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:06.947241 env[1337]: time="2024-02-12T19:46:06.947166169Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:06.947416 env[1337]: time="2024-02-12T19:46:06.947216069Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:06.947416 env[1337]: time="2024-02-12T19:46:06.947230969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:06.947416 env[1337]: time="2024-02-12T19:46:06.947357369Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92 pid=4598 runtime=io.containerd.runc.v2 Feb 12 19:46:06.964000 audit[4615]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:06.964000 audit[4615]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdf1770ec0 a2=0 a3=7ffdf1770eac items=0 ppid=2616 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.966000 audit[4615]: NETFILTER_CFG table=nat:119 family=2 entries=44 op=nft_register_rule pid=4615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:06.966000 audit[4615]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdf1770ec0 a2=0 a3=7ffdf1770eac items=0 ppid=2616 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:06.981111 systemd[1]: Started cri-containerd-4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92.scope. Feb 12 19:46:06.996000 audit[4625]: NETFILTER_CFG table=filter:120 family=2 entries=44 op=nft_register_chain pid=4625 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:06.996000 audit[4625]: SYSCALL arch=c000003e syscall=46 success=yes exit=22344 a0=3 a1=7ffd14efe310 a2=0 a3=7ffd14efe2fc items=0 ppid=3979 pid=4625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:06.996000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit: BPF prog-id=182 op=LOAD Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4598 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363139396130346530613038623233326638353463333733313233 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4598 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363139396130346530613038623233326638353463333733313233 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit: BPF prog-id=183 op=LOAD Feb 12 19:46:07.002000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025730 items=0 ppid=4598 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363139396130346530613038623233326638353463333733313233 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit: BPF prog-id=184 op=LOAD Feb 12 19:46:07.002000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025778 items=0 ppid=4598 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363139396130346530613038623233326638353463333733313233 Feb 12 19:46:07.002000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:46:07.002000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:07.002000 audit: BPF prog-id=185 op=LOAD Feb 12 19:46:07.002000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025b88 items=0 ppid=4598 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466363139396130346530613038623233326638353463333733313233 Feb 12 19:46:07.018174 env[1337]: time="2024-02-12T19:46:07.018121189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qm5rg,Uid:a6c5fdf4-4e55-49cb-827f-7effd0243382,Namespace:calico-system,Attempt:1,} returns sandbox id \"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92\"" Feb 12 19:46:07.738920 systemd[1]: run-containerd-runc-k8s.io-4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92-runc.b3RAXN.mount: Deactivated successfully. Feb 12 19:46:07.989000 audit[4641]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:07.989000 audit[4641]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd716aa770 a2=0 a3=7ffd716aa75c items=0 ppid=2616 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:07.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:08.014000 audit[4641]: NETFILTER_CFG table=nat:122 family=2 entries=56 op=nft_register_chain pid=4641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:08.014000 audit[4641]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd716aa770 a2=0 a3=7ffd716aa75c items=0 ppid=2616 pid=4641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:08.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:08.041987 systemd-networkd[1484]: calicc157556c8a: Gained IPv6LL Feb 12 19:46:08.170100 systemd-networkd[1484]: cali64521ac11dd: Gained IPv6LL Feb 12 19:46:08.746060 systemd-networkd[1484]: calic301b7ead95: Gained IPv6LL Feb 12 19:46:10.782156 env[1337]: time="2024-02-12T19:46:10.782101310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:10.789287 env[1337]: time="2024-02-12T19:46:10.789226722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:10.793634 env[1337]: time="2024-02-12T19:46:10.793568729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:10.799577 env[1337]: time="2024-02-12T19:46:10.799544339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:10.800461 env[1337]: time="2024-02-12T19:46:10.800419341Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 19:46:10.804130 env[1337]: time="2024-02-12T19:46:10.804096447Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:46:10.819329 env[1337]: time="2024-02-12T19:46:10.819293872Z" level=info msg="CreateContainer within sandbox \"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:46:10.854782 env[1337]: time="2024-02-12T19:46:10.854730931Z" level=info msg="CreateContainer within sandbox \"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573\"" Feb 12 19:46:10.857436 env[1337]: time="2024-02-12T19:46:10.855496433Z" level=info msg="StartContainer for \"4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573\"" Feb 12 19:46:10.888984 systemd[1]: Started cri-containerd-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573.scope. Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit: BPF prog-id=186 op=LOAD Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4404 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:10.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353862623634623139313633643061326438363564313436383538 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4404 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:10.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353862623634623139313633643061326438363564313436383538 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.904000 audit: BPF prog-id=187 op=LOAD Feb 12 19:46:10.904000 audit[4659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e7680 items=0 ppid=4404 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:10.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353862623634623139313633643061326438363564313436383538 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit: BPF prog-id=188 op=LOAD Feb 12 19:46:10.905000 audit[4659]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002e76c8 items=0 ppid=4404 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:10.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353862623634623139313633643061326438363564313436383538 Feb 12 19:46:10.905000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:46:10.905000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { perfmon } for pid=4659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit[4659]: AVC avc: denied { bpf } for pid=4659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:10.905000 audit: BPF prog-id=189 op=LOAD Feb 12 19:46:10.905000 audit[4659]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002e7ad8 items=0 ppid=4404 pid=4659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:10.905000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466353862623634623139313633643061326438363564313436383538 Feb 12 19:46:10.945032 env[1337]: time="2024-02-12T19:46:10.944981282Z" level=info msg="StartContainer for \"4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573\" returns successfully" Feb 12 19:46:11.929230 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.YYEKur.mount: Deactivated successfully. Feb 12 19:46:11.938518 kubelet[2467]: I0212 19:46:11.938275 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-784b5bcdbd-xqxrj" podStartSLOduration=48.553778614 podCreationTimestamp="2024-02-12 19:45:19 +0000 UTC" firstStartedPulling="2024-02-12 19:46:06.416385668 +0000 UTC m=+68.888132676" lastFinishedPulling="2024-02-12 19:46:10.800833442 +0000 UTC m=+73.272580350" observedRunningTime="2024-02-12 19:46:11.936295181 +0000 UTC m=+74.408042089" watchObservedRunningTime="2024-02-12 19:46:11.938226288 +0000 UTC m=+74.409973296" Feb 12 19:46:12.774911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2756470407.mount: Deactivated successfully. Feb 12 19:46:13.666800 env[1337]: time="2024-02-12T19:46:13.664832613Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:13.765923 env[1337]: time="2024-02-12T19:46:13.765858110Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:13.822194 env[1337]: time="2024-02-12T19:46:13.822136368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:13.870478 env[1337]: time="2024-02-12T19:46:13.870427175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:13.871262 env[1337]: time="2024-02-12T19:46:13.871224690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:46:13.873566 env[1337]: time="2024-02-12T19:46:13.873533833Z" level=info msg="CreateContainer within sandbox \"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:46:14.173081 env[1337]: time="2024-02-12T19:46:14.172990017Z" level=info msg="CreateContainer within sandbox \"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ada3e83ae19b41d9899c6a07159a4acaf3228a916fb84d65c3a67a3be59cdd78\"" Feb 12 19:46:14.173819 env[1337]: time="2024-02-12T19:46:14.173761532Z" level=info msg="StartContainer for \"ada3e83ae19b41d9899c6a07159a4acaf3228a916fb84d65c3a67a3be59cdd78\"" Feb 12 19:46:14.205908 systemd[1]: Started cri-containerd-ada3e83ae19b41d9899c6a07159a4acaf3228a916fb84d65c3a67a3be59cdd78.scope. Feb 12 19:46:14.210800 systemd[1]: run-containerd-runc-k8s.io-ada3e83ae19b41d9899c6a07159a4acaf3228a916fb84d65c3a67a3be59cdd78-runc.5to3jb.mount: Deactivated successfully. Feb 12 19:46:14.232693 kernel: kauditd_printk_skb: 308 callbacks suppressed Feb 12 19:46:14.232795 kernel: audit: type=1400 audit(1707767174.224:1387): avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f43388d2298 items=0 ppid=4598 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:14.262949 kernel: audit: type=1300 audit(1707767174.224:1387): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f43388d2298 items=0 ppid=4598 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:14.280438 kernel: audit: type=1327 audit(1707767174.224:1387): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613365383361653139623431643938393963366130373135396134 Feb 12 19:46:14.280492 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613365383361653139623431643938393963366130373135396134 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.286027 env[1337]: time="2024-02-12T19:46:14.285988713Z" level=info msg="StartContainer for \"ada3e83ae19b41d9899c6a07159a4acaf3228a916fb84d65c3a67a3be59cdd78\" returns successfully" Feb 12 19:46:14.287338 env[1337]: time="2024-02-12T19:46:14.287315137Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.305617 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.305691 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.317919 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.342792 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.356527 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.356593 kernel: audit: type=1400 audit(1707767174.224:1388): avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit: BPF prog-id=190 op=LOAD Feb 12 19:46:14.224000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00024c5d8 items=0 ppid=4598 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:14.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613365383361653139623431643938393963366130373135396134 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.224000 audit: BPF prog-id=191 op=LOAD Feb 12 19:46:14.224000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00024c628 items=0 ppid=4598 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:14.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613365383361653139623431643938393963366130373135396134 Feb 12 19:46:14.224000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:46:14.225000 audit: BPF prog-id=190 op=UNLOAD Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { perfmon } for pid=4727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit[4727]: AVC avc: denied { bpf } for pid=4727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:14.225000 audit: BPF prog-id=192 op=LOAD Feb 12 19:46:14.225000 audit[4727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00024c6b8 items=0 ppid=4598 pid=4727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:14.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164613365383361653139623431643938393963366130373135396134 Feb 12 19:46:19.465576 env[1337]: time="2024-02-12T19:46:19.465519908Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:19.560530 env[1337]: time="2024-02-12T19:46:19.560483161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:19.624264 env[1337]: time="2024-02-12T19:46:19.624217870Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:19.671498 env[1337]: time="2024-02-12T19:46:19.671436791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:19.672221 env[1337]: time="2024-02-12T19:46:19.672179504Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:46:19.674684 env[1337]: time="2024-02-12T19:46:19.674648547Z" level=info msg="CreateContainer within sandbox \"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:46:20.020780 env[1337]: time="2024-02-12T19:46:20.020702164Z" level=info msg="CreateContainer within sandbox \"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a8e50f81f7668637d44183bcf048f128913e99c9b9b59e3620846dc515f31899\"" Feb 12 19:46:20.021638 env[1337]: time="2024-02-12T19:46:20.021603479Z" level=info msg="StartContainer for \"a8e50f81f7668637d44183bcf048f128913e99c9b9b59e3620846dc515f31899\"" Feb 12 19:46:20.063582 systemd[1]: Started cri-containerd-a8e50f81f7668637d44183bcf048f128913e99c9b9b59e3620846dc515f31899.scope. Feb 12 19:46:20.081000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.087510 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 12 19:46:20.087637 kernel: audit: type=1400 audit(1707767180.081:1393): avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122455 kernel: audit: type=1300 audit(1707767180.081:1393): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1e441edcb8 items=0 ppid=4598 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:20.081000 audit[4763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1e441edcb8 items=0 ppid=4598 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:20.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653530663831663736363836333764343431383362636630343866 Feb 12 19:46:20.149366 env[1337]: time="2024-02-12T19:46:20.143677477Z" level=info msg="StartContainer for \"a8e50f81f7668637d44183bcf048f128913e99c9b9b59e3620846dc515f31899\" returns successfully" Feb 12 19:46:20.150287 kernel: audit: type=1327 audit(1707767180.081:1393): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653530663831663736363836333764343431383362636630343866 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.175225 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.175309 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.187632 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.187707 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.212633 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.216942 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.237918 kernel: audit: type=1400 audit(1707767180.082:1394): avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.082000 audit: BPF prog-id=193 op=LOAD Feb 12 19:46:20.082000 audit[4763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b53f8 items=0 ppid=4598 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:20.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653530663831663736363836333764343431383362636630343866 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit: BPF prog-id=194 op=LOAD Feb 12 19:46:20.122000 audit[4763]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5448 items=0 ppid=4598 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:20.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653530663831663736363836333764343431383362636630343866 Feb 12 19:46:20.122000 audit: BPF prog-id=194 op=UNLOAD Feb 12 19:46:20.122000 audit: BPF prog-id=193 op=UNLOAD Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { perfmon } for pid=4763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit[4763]: AVC avc: denied { bpf } for pid=4763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:20.122000 audit: BPF prog-id=195 op=LOAD Feb 12 19:46:20.122000 audit[4763]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b54d8 items=0 ppid=4598 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:20.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653530663831663736363836333764343431383362636630343866 Feb 12 19:46:20.779602 kubelet[2467]: I0212 19:46:20.779563 2467 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:46:20.779602 kubelet[2467]: I0212 19:46:20.779609 2467 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:46:22.256284 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.0jlgz6.mount: Deactivated successfully. Feb 12 19:46:30.139163 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.lLQpO1.mount: Deactivated successfully. Feb 12 19:46:30.197922 kubelet[2467]: I0212 19:46:30.197891 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qm5rg" podStartSLOduration=59.544450209 podCreationTimestamp="2024-02-12 19:45:18 +0000 UTC" firstStartedPulling="2024-02-12 19:46:07.019454291 +0000 UTC m=+69.491201199" lastFinishedPulling="2024-02-12 19:46:19.672832916 +0000 UTC m=+82.144579824" observedRunningTime="2024-02-12 19:46:20.936454997 +0000 UTC m=+83.408201905" watchObservedRunningTime="2024-02-12 19:46:30.197828834 +0000 UTC m=+92.669575742" Feb 12 19:46:32.736588 kubelet[2467]: I0212 19:46:32.736545 2467 topology_manager.go:215] "Topology Admit Handler" podUID="63a325cc-042a-4603-a039-76f00c5f277c" podNamespace="calico-apiserver" podName="calico-apiserver-74dff87d56-577mt" Feb 12 19:46:32.743311 systemd[1]: Created slice kubepods-besteffort-pod63a325cc_042a_4603_a039_76f00c5f277c.slice. Feb 12 19:46:32.747757 kubelet[2467]: W0212 19:46:32.747736 2467 reflector.go:535] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:46:32.747966 kubelet[2467]: E0212 19:46:32.747953 2467 reflector.go:147] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:46:32.748213 kubelet[2467]: W0212 19:46:32.748197 2467 reflector.go:535] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:46:32.748334 kubelet[2467]: E0212 19:46:32.748309 2467 reflector.go:147] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-3bedefc55b" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-3bedefc55b' and this object Feb 12 19:46:32.752530 kubelet[2467]: I0212 19:46:32.752505 2467 topology_manager.go:215] "Topology Admit Handler" podUID="aea4ac9a-4fe2-455c-9584-8ef5f949a46d" podNamespace="calico-apiserver" podName="calico-apiserver-74dff87d56-p8wpx" Feb 12 19:46:32.758034 systemd[1]: Created slice kubepods-besteffort-podaea4ac9a_4fe2_455c_9584_8ef5f949a46d.slice. Feb 12 19:46:32.786000 audit[4852]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.792742 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 12 19:46:32.792840 kernel: audit: type=1325 audit(1707767192.786:1399): table=filter:123 family=2 entries=9 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.786000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc61f4a3a0 a2=0 a3=7ffc61f4a38c items=0 ppid=2616 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.825543 kernel: audit: type=1300 audit(1707767192.786:1399): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc61f4a3a0 a2=0 a3=7ffc61f4a38c items=0 ppid=2616 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.825650 kernel: audit: type=1327 audit(1707767192.786:1399): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.786000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.836355 kubelet[2467]: I0212 19:46:32.836282 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-calico-apiserver-certs\") pod \"calico-apiserver-74dff87d56-p8wpx\" (UID: \"aea4ac9a-4fe2-455c-9584-8ef5f949a46d\") " pod="calico-apiserver/calico-apiserver-74dff87d56-p8wpx" Feb 12 19:46:32.836528 kubelet[2467]: I0212 19:46:32.836432 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/63a325cc-042a-4603-a039-76f00c5f277c-calico-apiserver-certs\") pod \"calico-apiserver-74dff87d56-577mt\" (UID: \"63a325cc-042a-4603-a039-76f00c5f277c\") " pod="calico-apiserver/calico-apiserver-74dff87d56-577mt" Feb 12 19:46:32.836528 kubelet[2467]: I0212 19:46:32.836503 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-52s5g\" (UniqueName: \"kubernetes.io/projected/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-kube-api-access-52s5g\") pod \"calico-apiserver-74dff87d56-p8wpx\" (UID: \"aea4ac9a-4fe2-455c-9584-8ef5f949a46d\") " pod="calico-apiserver/calico-apiserver-74dff87d56-p8wpx" Feb 12 19:46:32.836674 kubelet[2467]: I0212 19:46:32.836534 2467 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c95rb\" (UniqueName: \"kubernetes.io/projected/63a325cc-042a-4603-a039-76f00c5f277c-kube-api-access-c95rb\") pod \"calico-apiserver-74dff87d56-577mt\" (UID: \"63a325cc-042a-4603-a039-76f00c5f277c\") " pod="calico-apiserver/calico-apiserver-74dff87d56-577mt" Feb 12 19:46:32.787000 audit[4852]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.851144 kernel: audit: type=1325 audit(1707767192.787:1400): table=nat:124 family=2 entries=20 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.787000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc61f4a3a0 a2=0 a3=7ffc61f4a38c items=0 ppid=2616 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.884574 kernel: audit: type=1300 audit(1707767192.787:1400): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc61f4a3a0 a2=0 a3=7ffc61f4a38c items=0 ppid=2616 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.884679 kernel: audit: type=1327 audit(1707767192.787:1400): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.884707 kernel: audit: type=1325 audit(1707767192.881:1401): table=filter:125 family=2 entries=10 op=nft_register_rule pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.881000 audit[4854]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.881000 audit[4854]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe59249260 a2=0 a3=7ffe5924924c items=0 ppid=2616 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.916037 kernel: audit: type=1300 audit(1707767192.881:1401): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe59249260 a2=0 a3=7ffe5924924c items=0 ppid=2616 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.926519 kernel: audit: type=1327 audit(1707767192.881:1401): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.882000 audit[4854]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:32.882000 audit[4854]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe59249260 a2=0 a3=7ffe5924924c items=0 ppid=2616 pid=4854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:32.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:32.940879 kernel: audit: type=1325 audit(1707767192.882:1402): table=nat:126 family=2 entries=20 op=nft_register_rule pid=4854 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:33.941689 kubelet[2467]: E0212 19:46:33.941635 2467 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 19:46:33.942194 kubelet[2467]: E0212 19:46:33.941750 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/63a325cc-042a-4603-a039-76f00c5f277c-calico-apiserver-certs podName:63a325cc-042a-4603-a039-76f00c5f277c nodeName:}" failed. No retries permitted until 2024-02-12 19:46:34.441725188 +0000 UTC m=+96.913472196 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/63a325cc-042a-4603-a039-76f00c5f277c-calico-apiserver-certs") pod "calico-apiserver-74dff87d56-577mt" (UID: "63a325cc-042a-4603-a039-76f00c5f277c") : failed to sync secret cache: timed out waiting for the condition Feb 12 19:46:33.942194 kubelet[2467]: E0212 19:46:33.941635 2467 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Feb 12 19:46:33.942194 kubelet[2467]: E0212 19:46:33.942068 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-calico-apiserver-certs podName:aea4ac9a-4fe2-455c-9584-8ef5f949a46d nodeName:}" failed. No retries permitted until 2024-02-12 19:46:34.442050193 +0000 UTC m=+96.913797101 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-calico-apiserver-certs") pod "calico-apiserver-74dff87d56-p8wpx" (UID: "aea4ac9a-4fe2-455c-9584-8ef5f949a46d") : failed to sync secret cache: timed out waiting for the condition Feb 12 19:46:33.947135 kubelet[2467]: E0212 19:46:33.947110 2467 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:33.947293 kubelet[2467]: E0212 19:46:33.947266 2467 projected.go:198] Error preparing data for projected volume kube-api-access-c95rb for pod calico-apiserver/calico-apiserver-74dff87d56-577mt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:33.947377 kubelet[2467]: E0212 19:46:33.947340 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/63a325cc-042a-4603-a039-76f00c5f277c-kube-api-access-c95rb podName:63a325cc-042a-4603-a039-76f00c5f277c nodeName:}" failed. No retries permitted until 2024-02-12 19:46:34.44732447 +0000 UTC m=+96.919071478 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-c95rb" (UniqueName: "kubernetes.io/projected/63a325cc-042a-4603-a039-76f00c5f277c-kube-api-access-c95rb") pod "calico-apiserver-74dff87d56-577mt" (UID: "63a325cc-042a-4603-a039-76f00c5f277c") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:33.949569 kubelet[2467]: E0212 19:46:33.949547 2467 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:33.949875 kubelet[2467]: E0212 19:46:33.949839 2467 projected.go:198] Error preparing data for projected volume kube-api-access-52s5g for pod calico-apiserver/calico-apiserver-74dff87d56-p8wpx: failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:33.949961 kubelet[2467]: E0212 19:46:33.949903 2467 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-kube-api-access-52s5g podName:aea4ac9a-4fe2-455c-9584-8ef5f949a46d nodeName:}" failed. No retries permitted until 2024-02-12 19:46:34.449889207 +0000 UTC m=+96.921636115 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-52s5g" (UniqueName: "kubernetes.io/projected/aea4ac9a-4fe2-455c-9584-8ef5f949a46d-kube-api-access-52s5g") pod "calico-apiserver-74dff87d56-p8wpx" (UID: "aea4ac9a-4fe2-455c-9584-8ef5f949a46d") : failed to sync configmap cache: timed out waiting for the condition Feb 12 19:46:34.548107 env[1337]: time="2024-02-12T19:46:34.548054064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74dff87d56-577mt,Uid:63a325cc-042a-4603-a039-76f00c5f277c,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:46:34.564323 env[1337]: time="2024-02-12T19:46:34.564281999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74dff87d56-p8wpx,Uid:aea4ac9a-4fe2-455c-9584-8ef5f949a46d,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:46:34.731384 systemd-networkd[1484]: calib15da269071: Link UP Feb 12 19:46:34.743295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:46:34.743398 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib15da269071: link becomes ready Feb 12 19:46:34.745592 systemd-networkd[1484]: calib15da269071: Gained carrier Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.641 [INFO][4859] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0 calico-apiserver-74dff87d56- calico-apiserver 63a325cc-042a-4603-a039-76f00c5f277c 1007 0 2024-02-12 19:46:32 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74dff87d56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b calico-apiserver-74dff87d56-577mt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib15da269071 [] []}} ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.642 [INFO][4859] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.682 [INFO][4884] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" HandleID="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.694 [INFO][4884] ipam_plugin.go 268: Auto assigning IP ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" HandleID="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f07e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"calico-apiserver-74dff87d56-577mt", "timestamp":"2024-02-12 19:46:34.682588509 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.694 [INFO][4884] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.694 [INFO][4884] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.694 [INFO][4884] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.696 [INFO][4884] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.703 [INFO][4884] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.707 [INFO][4884] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.710 [INFO][4884] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.713 [INFO][4884] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.713 [INFO][4884] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.714 [INFO][4884] ipam.go 1682: Creating new handle: k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.717 [INFO][4884] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.723 [INFO][4884] ipam.go 1216: Successfully claimed IPs: [192.168.34.133/26] block=192.168.34.128/26 handle="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.723 [INFO][4884] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.133/26] handle="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.724 [INFO][4884] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:34.758525 env[1337]: 2024-02-12 19:46:34.724 [INFO][4884] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.133/26] IPv6=[] ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" HandleID="k8s-pod-network.8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.725 [INFO][4859] k8s.go 385: Populated endpoint ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0", GenerateName:"calico-apiserver-74dff87d56-", Namespace:"calico-apiserver", SelfLink:"", UID:"63a325cc-042a-4603-a039-76f00c5f277c", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 46, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74dff87d56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"calico-apiserver-74dff87d56-577mt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib15da269071", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.725 [INFO][4859] k8s.go 386: Calico CNI using IPs: [192.168.34.133/32] ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.726 [INFO][4859] dataplane_linux.go 68: Setting the host side veth name to calib15da269071 ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.747 [INFO][4859] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.747 [INFO][4859] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0", GenerateName:"calico-apiserver-74dff87d56-", Namespace:"calico-apiserver", SelfLink:"", UID:"63a325cc-042a-4603-a039-76f00c5f277c", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 46, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74dff87d56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c", Pod:"calico-apiserver-74dff87d56-577mt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib15da269071", MAC:"42:7e:d1:10:35:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:34.759330 env[1337]: 2024-02-12 19:46:34.754 [INFO][4859] k8s.go 491: Wrote updated endpoint to datastore ContainerID="8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-577mt" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--577mt-eth0" Feb 12 19:46:34.800140 systemd-networkd[1484]: caliab8dfbdd4c7: Link UP Feb 12 19:46:34.808885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab8dfbdd4c7: link becomes ready Feb 12 19:46:34.811380 systemd-networkd[1484]: caliab8dfbdd4c7: Gained carrier Feb 12 19:46:34.814660 env[1337]: time="2024-02-12T19:46:34.813602503Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:34.814660 env[1337]: time="2024-02-12T19:46:34.813651304Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:34.814660 env[1337]: time="2024-02-12T19:46:34.813665304Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:34.814660 env[1337]: time="2024-02-12T19:46:34.813803606Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c pid=4921 runtime=io.containerd.runc.v2 Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.659 [INFO][4868] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0 calico-apiserver-74dff87d56- calico-apiserver aea4ac9a-4fe2-455c-9584-8ef5f949a46d 1011 0 2024-02-12 19:46:32 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:74dff87d56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-3bedefc55b calico-apiserver-74dff87d56-p8wpx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliab8dfbdd4c7 [] []}} ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.659 [INFO][4868] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.706 [INFO][4890] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" HandleID="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.719 [INFO][4890] ipam_plugin.go 268: Auto assigning IP ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" HandleID="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cfa0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-3bedefc55b", "pod":"calico-apiserver-74dff87d56-p8wpx", "timestamp":"2024-02-12 19:46:34.706775059 +0000 UTC"}, Hostname:"ci-3510.3.2-a-3bedefc55b", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.720 [INFO][4890] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.724 [INFO][4890] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.724 [INFO][4890] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-3bedefc55b' Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.741 [INFO][4890] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.749 [INFO][4890] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.764 [INFO][4890] ipam.go 489: Trying affinity for 192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.766 [INFO][4890] ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.769 [INFO][4890] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.769 [INFO][4890] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.772 [INFO][4890] ipam.go 1682: Creating new handle: k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254 Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.779 [INFO][4890] ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.790 [INFO][4890] ipam.go 1216: Successfully claimed IPs: [192.168.34.134/26] block=192.168.34.128/26 handle="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.790 [INFO][4890] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.134/26] handle="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" host="ci-3510.3.2-a-3bedefc55b" Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.790 [INFO][4890] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:34.831252 env[1337]: 2024-02-12 19:46:34.790 [INFO][4890] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.34.134/26] IPv6=[] ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" HandleID="k8s-pod-network.f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.795 [INFO][4868] k8s.go 385: Populated endpoint ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0", GenerateName:"calico-apiserver-74dff87d56-", Namespace:"calico-apiserver", SelfLink:"", UID:"aea4ac9a-4fe2-455c-9584-8ef5f949a46d", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 46, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74dff87d56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"", Pod:"calico-apiserver-74dff87d56-p8wpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliab8dfbdd4c7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.795 [INFO][4868] k8s.go 386: Calico CNI using IPs: [192.168.34.134/32] ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.795 [INFO][4868] dataplane_linux.go 68: Setting the host side veth name to caliab8dfbdd4c7 ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.812 [INFO][4868] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.813 [INFO][4868] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0", GenerateName:"calico-apiserver-74dff87d56-", Namespace:"calico-apiserver", SelfLink:"", UID:"aea4ac9a-4fe2-455c-9584-8ef5f949a46d", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 46, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"74dff87d56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254", Pod:"calico-apiserver-74dff87d56-p8wpx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliab8dfbdd4c7", MAC:"e6:55:26:33:74:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:34.832288 env[1337]: 2024-02-12 19:46:34.827 [INFO][4868] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254" Namespace="calico-apiserver" Pod="calico-apiserver-74dff87d56-p8wpx" WorkloadEndpoint="ci--3510.3.2--a--3bedefc55b-k8s-calico--apiserver--74dff87d56--p8wpx-eth0" Feb 12 19:46:34.839240 systemd[1]: Started cri-containerd-8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c.scope. Feb 12 19:46:34.859000 audit[4949]: NETFILTER_CFG table=filter:127 family=2 entries=51 op=nft_register_chain pid=4949 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:34.859000 audit[4949]: SYSCALL arch=c000003e syscall=46 success=yes exit=26884 a0=3 a1=7ffc8221c030 a2=0 a3=7ffc8221c01c items=0 ppid=3979 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.859000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:34.863256 env[1337]: time="2024-02-12T19:46:34.863167619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:46:34.863256 env[1337]: time="2024-02-12T19:46:34.863224120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:46:34.863476 env[1337]: time="2024-02-12T19:46:34.863426523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:46:34.863791 env[1337]: time="2024-02-12T19:46:34.863743728Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254 pid=4970 runtime=io.containerd.runc.v2 Feb 12 19:46:34.880594 systemd[1]: Started cri-containerd-f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254.scope. Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.882000 audit: BPF prog-id=196 op=LOAD Feb 12 19:46:34.882000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.882000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4921 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863343639343330303033323263393938366439303938396238316130 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4921 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863343639343330303033323263393938366439303938396238316130 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.883000 audit: BPF prog-id=197 op=LOAD Feb 12 19:46:34.883000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bb580 items=0 ppid=4921 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863343639343330303033323263393938366439303938396238316130 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.884000 audit: BPF prog-id=198 op=LOAD Feb 12 19:46:34.884000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bb5c8 items=0 ppid=4921 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863343639343330303033323263393938366439303938396238316130 Feb 12 19:46:34.885000 audit: BPF prog-id=198 op=UNLOAD Feb 12 19:46:34.885000 audit: BPF prog-id=197 op=UNLOAD Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.885000 audit: BPF prog-id=199 op=LOAD Feb 12 19:46:34.885000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bb9d8 items=0 ppid=4921 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863343639343330303033323263393938366439303938396238316130 Feb 12 19:46:34.929000 audit[4993]: NETFILTER_CFG table=filter:128 family=2 entries=42 op=nft_register_chain pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:46:34.931341 env[1337]: time="2024-02-12T19:46:34.931301104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74dff87d56-577mt,Uid:63a325cc-042a-4603-a039-76f00c5f277c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c\"" Feb 12 19:46:34.933497 env[1337]: time="2024-02-12T19:46:34.933469736Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:46:34.929000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=22088 a0=3 a1=7ffc32e7e9e0 a2=0 a3=7ffc32e7e9cc items=0 ppid=3979 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.929000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit: BPF prog-id=200 op=LOAD Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4970 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663133306463363338656261343738623930306462383135303536 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4970 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663133306463363338656261343738623930306462383135303536 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit: BPF prog-id=201 op=LOAD Feb 12 19:46:34.940000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000228350 items=0 ppid=4970 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663133306463363338656261343738623930306462383135303536 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit: BPF prog-id=202 op=LOAD Feb 12 19:46:34.940000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000228398 items=0 ppid=4970 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663133306463363338656261343738623930306462383135303536 Feb 12 19:46:34.940000 audit: BPF prog-id=202 op=UNLOAD Feb 12 19:46:34.940000 audit: BPF prog-id=201 op=UNLOAD Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { perfmon } for pid=4980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit[4980]: AVC avc: denied { bpf } for pid=4980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:34.940000 audit: BPF prog-id=203 op=LOAD Feb 12 19:46:34.940000 audit[4980]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002287a8 items=0 ppid=4970 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:34.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663133306463363338656261343738623930306462383135303536 Feb 12 19:46:34.972029 env[1337]: time="2024-02-12T19:46:34.971983693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-74dff87d56-p8wpx,Uid:aea4ac9a-4fe2-455c-9584-8ef5f949a46d,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254\"" Feb 12 19:46:36.458002 systemd-networkd[1484]: calib15da269071: Gained IPv6LL Feb 12 19:46:36.714237 systemd-networkd[1484]: caliab8dfbdd4c7: Gained IPv6LL Feb 12 19:46:37.110519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2221320586.mount: Deactivated successfully. Feb 12 19:46:39.137878 env[1337]: time="2024-02-12T19:46:39.137828604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.142839 env[1337]: time="2024-02-12T19:46:39.142796171Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.146805 env[1337]: time="2024-02-12T19:46:39.146767926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.151937 env[1337]: time="2024-02-12T19:46:39.151894195Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.152739 env[1337]: time="2024-02-12T19:46:39.152711207Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:46:39.154765 env[1337]: time="2024-02-12T19:46:39.154729234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:46:39.156740 env[1337]: time="2024-02-12T19:46:39.156707661Z" level=info msg="CreateContainer within sandbox \"8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:46:39.188101 env[1337]: time="2024-02-12T19:46:39.188063488Z" level=info msg="CreateContainer within sandbox \"8c46943000322c9986d90989b81a08f593a4541bbf8edfd188c2da025ababc4c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075\"" Feb 12 19:46:39.190280 env[1337]: time="2024-02-12T19:46:39.188810098Z" level=info msg="StartContainer for \"9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075\"" Feb 12 19:46:39.217121 systemd[1]: Started cri-containerd-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075.scope. Feb 12 19:46:39.234480 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 19:46:39.234589 kernel: audit: type=1400 audit(1707767199.228:1441): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.275276 kernel: audit: type=1400 audit(1707767199.228:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.275364 kernel: audit: type=1400 audit(1707767199.228:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.289500 kernel: audit: type=1400 audit(1707767199.228:1444): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.303882 kernel: audit: type=1400 audit(1707767199.228:1445): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.329805 kernel: audit: type=1400 audit(1707767199.228:1446): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.329902 kernel: audit: type=1400 audit(1707767199.228:1447): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.356931 kernel: audit: type=1400 audit(1707767199.228:1448): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.357060 kernel: audit: type=1400 audit(1707767199.228:1449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.370915 kernel: audit: type=1400 audit(1707767199.248:1450): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit: BPF prog-id=204 op=LOAD Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4921 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326331613830393132666532666664646130623236636539623939 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4921 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326331613830393132666532666664646130623236636539623939 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.248000 audit: BPF prog-id=205 op=LOAD Feb 12 19:46:39.248000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001bde00 items=0 ppid=4921 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326331613830393132666532666664646130623236636539623939 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit: BPF prog-id=206 op=LOAD Feb 12 19:46:39.261000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001bde48 items=0 ppid=4921 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326331613830393132666532666664646130623236636539623939 Feb 12 19:46:39.261000 audit: BPF prog-id=206 op=UNLOAD Feb 12 19:46:39.261000 audit: BPF prog-id=205 op=UNLOAD Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.261000 audit: BPF prog-id=207 op=LOAD Feb 12 19:46:39.261000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000386258 items=0 ppid=4921 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326331613830393132666532666664646130623236636539623939 Feb 12 19:46:39.376189 env[1337]: time="2024-02-12T19:46:39.376149950Z" level=info msg="StartContainer for \"9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075\" returns successfully" Feb 12 19:46:39.703391 env[1337]: time="2024-02-12T19:46:39.703344106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.711124 env[1337]: time="2024-02-12T19:46:39.711091412Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.715610 env[1337]: time="2024-02-12T19:46:39.715577173Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.719287 env[1337]: time="2024-02-12T19:46:39.719256623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:46:39.719819 env[1337]: time="2024-02-12T19:46:39.719794931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:46:39.725729 env[1337]: time="2024-02-12T19:46:39.725700611Z" level=info msg="CreateContainer within sandbox \"f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:46:39.751644 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1343035233.mount: Deactivated successfully. Feb 12 19:46:39.757640 env[1337]: time="2024-02-12T19:46:39.757605446Z" level=info msg="CreateContainer within sandbox \"f4f130dc638eba478b900db8150562a96333e19c53802671f7623015c58f3254\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc\"" Feb 12 19:46:39.760353 env[1337]: time="2024-02-12T19:46:39.759589973Z" level=info msg="StartContainer for \"abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc\"" Feb 12 19:46:39.779671 systemd[1]: Started cri-containerd-abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc.scope. Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.797000 audit: BPF prog-id=208 op=LOAD Feb 12 19:46:39.798000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.798000 audit[5064]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4970 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666534636364313261353834616535356635663532366230313366 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4970 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666534636364313261353834616535356635663532366230313366 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.799000 audit: BPF prog-id=209 op=LOAD Feb 12 19:46:39.799000 audit[5064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e7ac0 items=0 ppid=4970 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666534636364313261353834616535356635663532366230313366 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.800000 audit: BPF prog-id=210 op=LOAD Feb 12 19:46:39.800000 audit[5064]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e7b08 items=0 ppid=4970 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666534636364313261353834616535356635663532366230313366 Feb 12 19:46:39.801000 audit: BPF prog-id=210 op=UNLOAD Feb 12 19:46:39.801000 audit: BPF prog-id=209 op=UNLOAD Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:46:39.801000 audit: BPF prog-id=211 op=LOAD Feb 12 19:46:39.801000 audit[5064]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e7f18 items=0 ppid=4970 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:39.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666534636364313261353834616535356635663532366230313366 Feb 12 19:46:39.842287 env[1337]: time="2024-02-12T19:46:39.842235098Z" level=info msg="StartContainer for \"abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc\" returns successfully" Feb 12 19:46:40.002557 kubelet[2467]: I0212 19:46:40.002458 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74dff87d56-577mt" podStartSLOduration=3.782201096 podCreationTimestamp="2024-02-12 19:46:32 +0000 UTC" firstStartedPulling="2024-02-12 19:46:34.932854927 +0000 UTC m=+97.404601835" lastFinishedPulling="2024-02-12 19:46:39.153067811 +0000 UTC m=+101.624814719" observedRunningTime="2024-02-12 19:46:39.989088298 +0000 UTC m=+102.460835206" watchObservedRunningTime="2024-02-12 19:46:40.00241398 +0000 UTC m=+102.474160988" Feb 12 19:46:40.019000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:46:40.019000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ee8820 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:46:40.019000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:46:40.034000 audit[5098]: NETFILTER_CFG table=filter:129 family=2 entries=10 op=nft_register_rule pid=5098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:40.034000 audit[5098]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffda546b8a0 a2=0 a3=7ffda546b88c items=0 ppid=2616 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:40.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:40.035000 audit[5098]: NETFILTER_CFG table=nat:130 family=2 entries=20 op=nft_register_rule pid=5098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:40.035000 audit[5098]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffda546b8a0 a2=0 a3=7ffda546b88c items=0 ppid=2616 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:40.035000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:40.046000 audit[5100]: NETFILTER_CFG table=filter:131 family=2 entries=10 op=nft_register_rule pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:40.046000 audit[5100]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff37fb48e0 a2=0 a3=7fff37fb48cc items=0 ppid=2616 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:40.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:40.047000 audit[5100]: NETFILTER_CFG table=nat:132 family=2 entries=20 op=nft_register_rule pid=5100 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:46:40.047000 audit[5100]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff37fb48e0 a2=0 a3=7fff37fb48cc items=0 ppid=2616 pid=5100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:40.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:46:40.565000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:46:40.565000 audit[5075]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e2c860 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:46:40.565000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:46:51.656000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:51.661903 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 19:46:51.662021 kernel: audit: type=1400 audit(1707767211.656:1484): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:51.656000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:51.695958 kernel: audit: type=1400 audit(1707767211.656:1483): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:51.696071 kernel: audit: type=1300 audit(1707767211.656:1483): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027865e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:51.656000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027865e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:51.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:51.753350 kernel: audit: type=1327 audit(1707767211.656:1483): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:51.753491 kernel: audit: type=1300 audit(1707767211.656:1484): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277af30 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:51.656000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00277af30 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:46:51.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:51.791101 kernel: audit: type=1327 audit(1707767211.656:1484): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:46:52.131000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.151160 kernel: audit: type=1400 audit(1707767212.131:1485): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.134000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.169882 kernel: audit: type=1400 audit(1707767212.134:1486): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.134000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00843b320 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.207795 kernel: audit: type=1300 audit(1707767212.134:1486): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00843b320 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.207928 kernel: audit: type=1327 audit(1707767212.134:1486): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.134000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.134000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00843b440 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.131000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c008251ec0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.189000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.189000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009143f50 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.220000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.220000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a6ef440 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:52.221000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:46:52.221000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00a6ff110 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:46:52.221000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:46:58.159143 env[1337]: time="2024-02-12T19:46:58.159084464Z" level=info msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.190 [WARNING][5153] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0", GenerateName:"calico-kube-controllers-784b5bcdbd-", Namespace:"calico-system", SelfLink:"", UID:"6aa62b87-34ad-4d93-b5f8-e9e7359629b3", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784b5bcdbd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce", Pod:"calico-kube-controllers-784b5bcdbd-xqxrj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc157556c8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.190 [INFO][5153] k8s.go 578: Cleaning up netns ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.190 [INFO][5153] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" iface="eth0" netns="" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.190 [INFO][5153] k8s.go 585: Releasing IP address(es) ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.190 [INFO][5153] utils.go 188: Calico CNI releasing IP address ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.212 [INFO][5159] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.212 [INFO][5159] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.212 [INFO][5159] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.218 [WARNING][5159] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.218 [INFO][5159] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.220 [INFO][5159] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.222135 env[1337]: 2024-02-12 19:46:58.221 [INFO][5153] k8s.go 591: Teardown processing complete. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.222909 env[1337]: time="2024-02-12T19:46:58.222163457Z" level=info msg="TearDown network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" successfully" Feb 12 19:46:58.222909 env[1337]: time="2024-02-12T19:46:58.222204557Z" level=info msg="StopPodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" returns successfully" Feb 12 19:46:58.222909 env[1337]: time="2024-02-12T19:46:58.222692062Z" level=info msg="RemovePodSandbox for \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" Feb 12 19:46:58.222909 env[1337]: time="2024-02-12T19:46:58.222730163Z" level=info msg="Forcibly stopping sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\"" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.254 [WARNING][5178] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0", GenerateName:"calico-kube-controllers-784b5bcdbd-", Namespace:"calico-system", SelfLink:"", UID:"6aa62b87-34ad-4d93-b5f8-e9e7359629b3", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"784b5bcdbd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e64631dd101d9325541c36fe77d533161877ce17d35b48b2b070fe243c09cdce", Pod:"calico-kube-controllers-784b5bcdbd-xqxrj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calicc157556c8a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.258 [INFO][5178] k8s.go 578: Cleaning up netns ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.258 [INFO][5178] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" iface="eth0" netns="" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.259 [INFO][5178] k8s.go 585: Releasing IP address(es) ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.259 [INFO][5178] utils.go 188: Calico CNI releasing IP address ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.277 [INFO][5184] ipam_plugin.go 415: Releasing address using handleID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.277 [INFO][5184] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.277 [INFO][5184] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.283 [WARNING][5184] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.283 [INFO][5184] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" HandleID="k8s-pod-network.9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Workload="ci--3510.3.2--a--3bedefc55b-k8s-calico--kube--controllers--784b5bcdbd--xqxrj-eth0" Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.284 [INFO][5184] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.286589 env[1337]: 2024-02-12 19:46:58.285 [INFO][5178] k8s.go 591: Teardown processing complete. ContainerID="9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38" Feb 12 19:46:58.287298 env[1337]: time="2024-02-12T19:46:58.286616964Z" level=info msg="TearDown network for sandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" successfully" Feb 12 19:46:58.341639 env[1337]: time="2024-02-12T19:46:58.341587668Z" level=info msg="RemovePodSandbox \"9b4daf6422b9f635cbd41b4a7ba944754000d6008f9a1af81e76a509768d1e38\" returns successfully" Feb 12 19:46:58.342125 env[1337]: time="2024-02-12T19:46:58.342094674Z" level=info msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.374 [WARNING][5204] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6c5fdf4-4e55-49cb-827f-7effd0243382", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92", Pod:"csi-node-driver-qm5rg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic301b7ead95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.374 [INFO][5204] k8s.go 578: Cleaning up netns ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.374 [INFO][5204] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" iface="eth0" netns="" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.374 [INFO][5204] k8s.go 585: Releasing IP address(es) ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.374 [INFO][5204] utils.go 188: Calico CNI releasing IP address ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.398 [INFO][5210] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.398 [INFO][5210] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.398 [INFO][5210] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.403 [WARNING][5210] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.403 [INFO][5210] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.404 [INFO][5210] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.406528 env[1337]: 2024-02-12 19:46:58.405 [INFO][5204] k8s.go 591: Teardown processing complete. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.407095 env[1337]: time="2024-02-12T19:46:58.406956786Z" level=info msg="TearDown network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" successfully" Feb 12 19:46:58.407095 env[1337]: time="2024-02-12T19:46:58.407000586Z" level=info msg="StopPodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" returns successfully" Feb 12 19:46:58.407501 env[1337]: time="2024-02-12T19:46:58.407468391Z" level=info msg="RemovePodSandbox for \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" Feb 12 19:46:58.407625 env[1337]: time="2024-02-12T19:46:58.407504292Z" level=info msg="Forcibly stopping sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\"" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.437 [WARNING][5229] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6c5fdf4-4e55-49cb-827f-7effd0243382", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"4f6199a04e0a08b232f854c373123abdc9e36951ec11eefc5cf0be83174a7d92", Pod:"csi-node-driver-qm5rg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic301b7ead95", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.437 [INFO][5229] k8s.go 578: Cleaning up netns ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.437 [INFO][5229] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" iface="eth0" netns="" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.437 [INFO][5229] k8s.go 585: Releasing IP address(es) ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.437 [INFO][5229] utils.go 188: Calico CNI releasing IP address ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.454 [INFO][5235] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.454 [INFO][5235] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.454 [INFO][5235] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.459 [WARNING][5235] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.459 [INFO][5235] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" HandleID="k8s-pod-network.d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Workload="ci--3510.3.2--a--3bedefc55b-k8s-csi--node--driver--qm5rg-eth0" Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.461 [INFO][5235] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.462994 env[1337]: 2024-02-12 19:46:58.462 [INFO][5229] k8s.go 591: Teardown processing complete. ContainerID="d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f" Feb 12 19:46:58.463798 env[1337]: time="2024-02-12T19:46:58.463743909Z" level=info msg="TearDown network for sandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" successfully" Feb 12 19:46:58.478869 env[1337]: time="2024-02-12T19:46:58.478827975Z" level=info msg="RemovePodSandbox \"d5ad20607af9380ca2d18f0bb485a360f39a995ddc55e0e8cbe7432b6bbb4d0f\" returns successfully" Feb 12 19:46:58.479354 env[1337]: time="2024-02-12T19:46:58.479326580Z" level=info msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.509 [WARNING][5254] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"0b46e87c-b59c-4353-8a23-d46d6d006b74", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524", Pod:"coredns-5dd5756b68-nrbjz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64114f49b21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.509 [INFO][5254] k8s.go 578: Cleaning up netns ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.509 [INFO][5254] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" iface="eth0" netns="" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.509 [INFO][5254] k8s.go 585: Releasing IP address(es) ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.509 [INFO][5254] utils.go 188: Calico CNI releasing IP address ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.527 [INFO][5260] ipam_plugin.go 415: Releasing address using handleID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.527 [INFO][5260] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.528 [INFO][5260] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.533 [WARNING][5260] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.533 [INFO][5260] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.534 [INFO][5260] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.536421 env[1337]: 2024-02-12 19:46:58.535 [INFO][5254] k8s.go 591: Teardown processing complete. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.537066 env[1337]: time="2024-02-12T19:46:58.537020814Z" level=info msg="TearDown network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" successfully" Feb 12 19:46:58.537161 env[1337]: time="2024-02-12T19:46:58.537064114Z" level=info msg="StopPodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" returns successfully" Feb 12 19:46:58.537720 env[1337]: time="2024-02-12T19:46:58.537683321Z" level=info msg="RemovePodSandbox for \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" Feb 12 19:46:58.537842 env[1337]: time="2024-02-12T19:46:58.537726022Z" level=info msg="Forcibly stopping sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\"" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.567 [WARNING][5278] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"0b46e87c-b59c-4353-8a23-d46d6d006b74", ResourceVersion:"864", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"e854073b0624870b60613e1dee1697a94555cb5a084055d8e78683628c270524", Pod:"coredns-5dd5756b68-nrbjz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64114f49b21", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.567 [INFO][5278] k8s.go 578: Cleaning up netns ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.567 [INFO][5278] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" iface="eth0" netns="" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.567 [INFO][5278] k8s.go 585: Releasing IP address(es) ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.567 [INFO][5278] utils.go 188: Calico CNI releasing IP address ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.585 [INFO][5284] ipam_plugin.go 415: Releasing address using handleID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.585 [INFO][5284] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.585 [INFO][5284] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.590 [WARNING][5284] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.590 [INFO][5284] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" HandleID="k8s-pod-network.3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--nrbjz-eth0" Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.592 [INFO][5284] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.593693 env[1337]: 2024-02-12 19:46:58.592 [INFO][5278] k8s.go 591: Teardown processing complete. ContainerID="3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb" Feb 12 19:46:58.594410 env[1337]: time="2024-02-12T19:46:58.593730637Z" level=info msg="TearDown network for sandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" successfully" Feb 12 19:46:58.599839 env[1337]: time="2024-02-12T19:46:58.599798503Z" level=info msg="RemovePodSandbox \"3dd17c43db3362f1f2c977e87979b7ccbe7874c26466c7e63ba2af12151060eb\" returns successfully" Feb 12 19:46:58.600525 env[1337]: time="2024-02-12T19:46:58.600493011Z" level=info msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.630 [WARNING][5302] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3dfb911a-daee-409f-82ae-6be195f7e89b", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50", Pod:"coredns-5dd5756b68-5cvhk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64521ac11dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.630 [INFO][5302] k8s.go 578: Cleaning up netns ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.630 [INFO][5302] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" iface="eth0" netns="" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.630 [INFO][5302] k8s.go 585: Releasing IP address(es) ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.630 [INFO][5302] utils.go 188: Calico CNI releasing IP address ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.651 [INFO][5308] ipam_plugin.go 415: Releasing address using handleID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.651 [INFO][5308] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.652 [INFO][5308] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.657 [WARNING][5308] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.657 [INFO][5308] ipam_plugin.go 443: Releasing address using workloadID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.659 [INFO][5308] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.661722 env[1337]: 2024-02-12 19:46:58.660 [INFO][5302] k8s.go 591: Teardown processing complete. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.662435 env[1337]: time="2024-02-12T19:46:58.661751984Z" level=info msg="TearDown network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" successfully" Feb 12 19:46:58.662435 env[1337]: time="2024-02-12T19:46:58.661812784Z" level=info msg="StopPodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" returns successfully" Feb 12 19:46:58.662435 env[1337]: time="2024-02-12T19:46:58.662350690Z" level=info msg="RemovePodSandbox for \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" Feb 12 19:46:58.662435 env[1337]: time="2024-02-12T19:46:58.662387191Z" level=info msg="Forcibly stopping sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\"" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.692 [WARNING][5326] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3dfb911a-daee-409f-82ae-6be195f7e89b", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 45, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-3bedefc55b", ContainerID:"da3223c7405d9af87136bd24c665e4d1ae356b1eada9f289405f0df07b93ba50", Pod:"coredns-5dd5756b68-5cvhk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali64521ac11dd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.693 [INFO][5326] k8s.go 578: Cleaning up netns ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.693 [INFO][5326] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" iface="eth0" netns="" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.693 [INFO][5326] k8s.go 585: Releasing IP address(es) ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.693 [INFO][5326] utils.go 188: Calico CNI releasing IP address ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.710 [INFO][5332] ipam_plugin.go 415: Releasing address using handleID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.710 [INFO][5332] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.710 [INFO][5332] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.716 [WARNING][5332] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.716 [INFO][5332] ipam_plugin.go 443: Releasing address using workloadID ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" HandleID="k8s-pod-network.601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Workload="ci--3510.3.2--a--3bedefc55b-k8s-coredns--5dd5756b68--5cvhk-eth0" Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.717 [INFO][5332] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:46:58.721379 env[1337]: 2024-02-12 19:46:58.718 [INFO][5326] k8s.go 591: Teardown processing complete. ContainerID="601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7" Feb 12 19:46:58.721379 env[1337]: time="2024-02-12T19:46:58.719261315Z" level=info msg="TearDown network for sandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" successfully" Feb 12 19:46:58.741795 env[1337]: time="2024-02-12T19:46:58.741746462Z" level=info msg="RemovePodSandbox \"601547b7829e7669994ac677ce0bc9383abbdfa3e200430cb5d20456f868ecb7\" returns successfully" Feb 12 19:47:00.652000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.657793 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:47:00.657899 kernel: audit: type=1400 audit(1707767220.652:1491): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.652000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786d00 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.694749 kernel: audit: type=1300 audit(1707767220.652:1491): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786d00 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.694845 kernel: audit: type=1327 audit(1707767220.652:1491): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.677000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.728332 kernel: audit: type=1400 audit(1707767220.677:1492): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.728427 kernel: audit: type=1300 audit(1707767220.677:1492): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786e20 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.677000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002786e20 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.766893 kernel: audit: type=1327 audit(1707767220.677:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.766980 kernel: audit: type=1400 audit(1707767220.677:1493): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.677000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.677000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029a1b00 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.820845 kernel: audit: type=1300 audit(1707767220.677:1493): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029a1b00 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.820931 kernel: audit: type=1327 audit(1707767220.677:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:00.820960 kernel: audit: type=1400 audit(1707767220.678:1494): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.678000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:00.678000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029a1d20 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:00.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:03.412083 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.WN250V.mount: Deactivated successfully. Feb 12 19:47:04.635688 kubelet[2467]: I0212 19:47:04.635642 2467 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-74dff87d56-p8wpx" podStartSLOduration=27.88811768 podCreationTimestamp="2024-02-12 19:46:32 +0000 UTC" firstStartedPulling="2024-02-12 19:46:34.97317891 +0000 UTC m=+97.444925818" lastFinishedPulling="2024-02-12 19:46:39.720657342 +0000 UTC m=+102.192404250" observedRunningTime="2024-02-12 19:46:40.007508048 +0000 UTC m=+102.479254956" watchObservedRunningTime="2024-02-12 19:47:04.635596112 +0000 UTC m=+127.107343020" Feb 12 19:47:04.671000 audit[5421]: NETFILTER_CFG table=filter:133 family=2 entries=9 op=nft_register_rule pid=5421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:04.671000 audit[5421]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffda2cd4050 a2=0 a3=7ffda2cd403c items=0 ppid=2616 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:04.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:04.675000 audit[5421]: NETFILTER_CFG table=nat:134 family=2 entries=27 op=nft_register_chain pid=5421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:04.675000 audit[5421]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffda2cd4050 a2=0 a3=7ffda2cd403c items=0 ppid=2616 pid=5421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:04.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:04.682000 audit[5423]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=5423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:04.682000 audit[5423]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe98a06340 a2=0 a3=7ffe98a0632c items=0 ppid=2616 pid=5423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:04.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:04.684000 audit[5423]: NETFILTER_CFG table=nat:136 family=2 entries=34 op=nft_register_chain pid=5423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:47:04.684000 audit[5423]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffe98a06340 a2=0 a3=7ffe98a0632c items=0 ppid=2616 pid=5423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:04.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:47:30.147021 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.4FVP8i.mount: Deactivated successfully. Feb 12 19:47:40.020000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:47:40.025882 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:47:40.025990 kernel: audit: type=1400 audit(1707767260.020:1499): avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:47:40.020000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00090c660 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:47:40.064528 kernel: audit: type=1300 audit(1707767260.020:1499): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00090c660 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:47:40.064619 kernel: audit: type=1327 audit(1707767260.020:1499): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:47:40.020000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:47:40.566000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:47:40.566000 audit[5075]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cc64c0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:47:40.606845 kernel: audit: type=1400 audit(1707767260.566:1500): avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:47:40.606960 kernel: audit: type=1300 audit(1707767260.566:1500): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cc64c0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:47:40.606984 kernel: audit: type=1327 audit(1707767260.566:1500): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:47:40.566000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:47:51.657000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:51.676897 kernel: audit: type=1400 audit(1707767271.657:1501): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:51.677012 kernel: audit: type=1300 audit(1707767271.657:1501): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb85c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:51.657000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb85c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:51.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:51.696890 kernel: audit: type=1327 audit(1707767271.657:1501): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:51.657000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:51.730405 kernel: audit: type=1400 audit(1707767271.657:1502): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:51.731077 kernel: audit: type=1300 audit(1707767271.657:1502): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7c840 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:51.657000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c7c840 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:47:51.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:51.751924 kernel: audit: type=1327 audit(1707767271.657:1502): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:47:52.134000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.153486 kernel: audit: type=1400 audit(1707767272.134:1504): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.153600 kernel: audit: type=1400 audit(1707767272.134:1503): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.134000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.134000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01371acc0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.188672 kernel: audit: type=1300 audit(1707767272.134:1503): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01371acc0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.188783 kernel: audit: type=1327 audit(1707767272.134:1503): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.134000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c013c64120 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.134000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.151000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.151000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012c5fc20 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.187000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.187000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c013c641b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.222000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.222000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c012d25660 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.222000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.222000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:47:52.222000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c01371ae40 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:47:52.222000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:47:52.256090 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.ThptT4.mount: Deactivated successfully. Feb 12 19:47:56.333131 update_engine[1327]: I0212 19:47:56.333071 1327 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 12 19:47:56.333131 update_engine[1327]: I0212 19:47:56.333123 1327 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.333290 1327 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.333825 1327 omaha_request_params.cc:62] Current group set to lts Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334024 1327 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334035 1327 update_attempter.cc:643] Scheduling an action processor start. Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334054 1327 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334093 1327 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334172 1327 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334179 1327 omaha_request_action.cc:271] Request: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.334187 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.335498 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 19:47:56.337353 update_engine[1327]: I0212 19:47:56.335727 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 19:47:56.337783 locksmithd[1417]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 12 19:47:56.368152 update_engine[1327]: E0212 19:47:56.368121 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 19:47:56.368283 update_engine[1327]: I0212 19:47:56.368242 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 12 19:48:00.142942 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.HeBQYV.mount: Deactivated successfully. Feb 12 19:48:00.654000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.659728 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:48:00.659832 kernel: audit: type=1400 audit(1707767280.654:1509): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.654000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb8e40 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.698327 kernel: audit: type=1300 audit(1707767280.654:1509): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb8e40 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.698467 kernel: audit: type=1327 audit(1707767280.654:1509): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.654000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.679000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.732243 kernel: audit: type=1400 audit(1707767280.679:1510): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.732365 kernel: audit: type=1300 audit(1707767280.679:1510): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107d8c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.679000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107d8c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.753995 kernel: audit: type=1327 audit(1707767280.679:1510): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.679000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.680000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.680000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb8e60 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.808481 kernel: audit: type=1400 audit(1707767280.680:1511): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.808575 kernel: audit: type=1300 audit(1707767280.680:1511): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb8e60 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.808601 kernel: audit: type=1327 audit(1707767280.680:1511): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:00.680000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.842721 kernel: audit: type=1400 audit(1707767280.680:1512): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:00.680000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001cb8e80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:00.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:03.411626 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.Ad77Np.mount: Deactivated successfully. Feb 12 19:48:04.575728 systemd[1]: run-containerd-runc-k8s.io-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075-runc.VmN5zT.mount: Deactivated successfully. Feb 12 19:48:05.564333 systemd[1]: run-containerd-runc-k8s.io-abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc-runc.rPdSte.mount: Deactivated successfully. Feb 12 19:48:06.264944 update_engine[1327]: I0212 19:48:06.264899 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 19:48:06.265395 update_engine[1327]: I0212 19:48:06.265147 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 19:48:06.265457 update_engine[1327]: I0212 19:48:06.265409 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 19:48:06.286926 update_engine[1327]: E0212 19:48:06.286883 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 19:48:06.287112 update_engine[1327]: I0212 19:48:06.287029 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 12 19:48:16.259628 update_engine[1327]: I0212 19:48:16.259569 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 19:48:16.260179 update_engine[1327]: I0212 19:48:16.259912 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 19:48:16.260252 update_engine[1327]: I0212 19:48:16.260180 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 19:48:16.282056 update_engine[1327]: E0212 19:48:16.282011 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 19:48:16.282211 update_engine[1327]: I0212 19:48:16.282140 1327 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 12 19:48:22.264947 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.2rPDem.mount: Deactivated successfully. Feb 12 19:48:26.261502 update_engine[1327]: I0212 19:48:26.261447 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 19:48:26.262060 update_engine[1327]: I0212 19:48:26.261747 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 19:48:26.262060 update_engine[1327]: I0212 19:48:26.262053 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 19:48:26.277518 update_engine[1327]: E0212 19:48:26.277478 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 19:48:26.277684 update_engine[1327]: I0212 19:48:26.277603 1327 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 19:48:26.277684 update_engine[1327]: I0212 19:48:26.277616 1327 omaha_request_action.cc:621] Omaha request response: Feb 12 19:48:26.277805 update_engine[1327]: E0212 19:48:26.277706 1327 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277725 1327 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277731 1327 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277737 1327 update_attempter.cc:306] Processing Done. Feb 12 19:48:26.277805 update_engine[1327]: E0212 19:48:26.277755 1327 update_attempter.cc:619] Update failed. Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277761 1327 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277767 1327 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 12 19:48:26.277805 update_engine[1327]: I0212 19:48:26.277774 1327 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 12 19:48:26.278242 update_engine[1327]: I0212 19:48:26.277895 1327 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 19:48:26.278242 update_engine[1327]: I0212 19:48:26.277925 1327 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 19:48:26.278242 update_engine[1327]: I0212 19:48:26.277931 1327 omaha_request_action.cc:271] Request: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: Feb 12 19:48:26.278242 update_engine[1327]: I0212 19:48:26.277937 1327 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 19:48:26.278242 update_engine[1327]: I0212 19:48:26.278131 1327 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 19:48:26.278760 update_engine[1327]: I0212 19:48:26.278327 1327 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 19:48:26.278840 locksmithd[1417]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 12 19:48:26.293849 update_engine[1327]: E0212 19:48:26.293814 1327 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293941 1327 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293951 1327 omaha_request_action.cc:621] Omaha request response: Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293958 1327 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293963 1327 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293967 1327 update_attempter.cc:306] Processing Done. Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293972 1327 update_attempter.cc:310] Error event sent. Feb 12 19:48:26.293984 update_engine[1327]: I0212 19:48:26.293982 1327 update_check_scheduler.cc:74] Next update check in 46m4s Feb 12 19:48:26.294382 locksmithd[1417]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 12 19:48:29.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.36:22-10.200.12.6:43214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.169204 systemd[1]: Started sshd@7-10.200.8.36:22-10.200.12.6:43214.service. Feb 12 19:48:29.173914 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:48:29.174107 kernel: audit: type=1130 audit(1707767309.167:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.36:22-10.200.12.6:43214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.794000 audit[5670]: USER_ACCT pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.795414 sshd[5670]: Accepted publickey for core from 10.200.12.6 port 43214 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:29.813000 audit[5670]: CRED_ACQ pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.815011 sshd[5670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:29.820390 systemd[1]: Started session-10.scope. Feb 12 19:48:29.821528 systemd-logind[1325]: New session 10 of user core. Feb 12 19:48:29.830893 kernel: audit: type=1101 audit(1707767309.794:1514): pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.830977 kernel: audit: type=1103 audit(1707767309.813:1515): pid=5670 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.841218 kernel: audit: type=1006 audit(1707767309.813:1516): pid=5670 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:48:29.813000 audit[5670]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcf88a3a0 a2=3 a3=0 items=0 ppid=1 pid=5670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:29.858807 kernel: audit: type=1300 audit(1707767309.813:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcf88a3a0 a2=3 a3=0 items=0 ppid=1 pid=5670 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:29.859006 kernel: audit: type=1327 audit(1707767309.813:1516): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:29.813000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:29.826000 audit[5670]: USER_START pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.828000 audit[5672]: CRED_ACQ pid=5672 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.899045 kernel: audit: type=1105 audit(1707767309.826:1517): pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.899122 kernel: audit: type=1103 audit(1707767309.828:1518): pid=5672 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:30.149626 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.tgeWSJ.mount: Deactivated successfully. Feb 12 19:48:30.344342 sshd[5670]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:30.345000 audit[5670]: USER_END pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:30.348361 systemd[1]: sshd@7-10.200.8.36:22-10.200.12.6:43214.service: Deactivated successfully. Feb 12 19:48:30.349367 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:48:30.351191 systemd-logind[1325]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:48:30.352158 systemd-logind[1325]: Removed session 10. Feb 12 19:48:30.345000 audit[5670]: CRED_DISP pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:30.380199 kernel: audit: type=1106 audit(1707767310.345:1519): pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:30.380316 kernel: audit: type=1104 audit(1707767310.345:1520): pid=5670 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:30.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.36:22-10.200.12.6:43214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:34.582326 systemd[1]: run-containerd-runc-k8s.io-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075-runc.YXLRqr.mount: Deactivated successfully. Feb 12 19:48:34.614553 systemd[1]: run-containerd-runc-k8s.io-abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc-runc.0uLzcJ.mount: Deactivated successfully. Feb 12 19:48:35.451675 systemd[1]: Started sshd@8-10.200.8.36:22-10.200.12.6:43224.service. Feb 12 19:48:35.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.36:22-10.200.12.6:43224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:35.457580 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:48:35.457671 kernel: audit: type=1130 audit(1707767315.451:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.36:22-10.200.12.6:43224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:36.078000 audit[5746]: USER_ACCT pid=5746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.080100 sshd[5746]: Accepted publickey for core from 10.200.12.6 port 43224 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:36.099968 kernel: audit: type=1101 audit(1707767316.078:1523): pid=5746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.099000 audit[5746]: CRED_ACQ pid=5746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.100345 sshd[5746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:36.107579 systemd[1]: Started session-11.scope. Feb 12 19:48:36.108968 systemd-logind[1325]: New session 11 of user core. Feb 12 19:48:36.118166 kernel: audit: type=1103 audit(1707767316.099:1524): pid=5746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.118238 kernel: audit: type=1006 audit(1707767316.099:1525): pid=5746 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:48:36.099000 audit[5746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccfd1dad0 a2=3 a3=0 items=0 ppid=1 pid=5746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.128929 kernel: audit: type=1300 audit(1707767316.099:1525): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccfd1dad0 a2=3 a3=0 items=0 ppid=1 pid=5746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.099000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:36.145886 kernel: audit: type=1327 audit(1707767316.099:1525): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:36.113000 audit[5746]: USER_START pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.151926 kernel: audit: type=1105 audit(1707767316.113:1526): pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.115000 audit[5748]: CRED_ACQ pid=5748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.169886 kernel: audit: type=1103 audit(1707767316.115:1527): pid=5748 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.591432 sshd[5746]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:36.592000 audit[5746]: USER_END pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.595179 systemd[1]: sshd@8-10.200.8.36:22-10.200.12.6:43224.service: Deactivated successfully. Feb 12 19:48:36.596159 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:48:36.597547 systemd-logind[1325]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:48:36.598510 systemd-logind[1325]: Removed session 11. Feb 12 19:48:36.592000 audit[5746]: CRED_DISP pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.628196 kernel: audit: type=1106 audit(1707767316.592:1528): pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.628299 kernel: audit: type=1104 audit(1707767316.592:1529): pid=5746 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:36.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.36:22-10.200.12.6:43224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:40.023000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:48:40.023000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001938260 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:48:40.023000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:48:40.568000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:48:40.572840 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 19:48:40.572984 kernel: audit: type=1400 audit(1707767320.568:1532): avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:48:40.568000 audit[5075]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b1efc0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:48:40.610891 kernel: audit: type=1300 audit(1707767320.568:1532): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b1efc0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:48:40.611003 kernel: audit: type=1327 audit(1707767320.568:1532): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:48:40.568000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:48:41.697766 systemd[1]: Started sshd@9-10.200.8.36:22-10.200.12.6:34764.service. Feb 12 19:48:41.715901 kernel: audit: type=1130 audit(1707767321.697:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.36:22-10.200.12.6:34764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:41.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.36:22-10.200.12.6:34764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:42.333656 kernel: audit: type=1101 audit(1707767322.313:1534): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.313000 audit[5761]: USER_ACCT pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.317423 sshd[5761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:42.334221 sshd[5761]: Accepted publickey for core from 10.200.12.6 port 34764 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:42.316000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.341187 systemd[1]: Started session-12.scope. Feb 12 19:48:42.342286 systemd-logind[1325]: New session 12 of user core. Feb 12 19:48:42.362191 kernel: audit: type=1103 audit(1707767322.316:1535): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.362265 kernel: audit: type=1006 audit(1707767322.316:1536): pid=5761 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:48:42.316000 audit[5761]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffead305a0 a2=3 a3=0 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.379531 kernel: audit: type=1300 audit(1707767322.316:1536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffead305a0 a2=3 a3=0 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:42.383829 kernel: audit: type=1327 audit(1707767322.316:1536): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:42.316000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:42.351000 audit[5761]: USER_START pid=5761 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.385886 kernel: audit: type=1105 audit(1707767322.351:1537): pid=5761 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.353000 audit[5765]: CRED_ACQ pid=5765 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.809533 sshd[5761]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:42.810000 audit[5761]: USER_END pid=5761 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.810000 audit[5761]: CRED_DISP pid=5761 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:42.813476 systemd[1]: sshd@9-10.200.8.36:22-10.200.12.6:34764.service: Deactivated successfully. Feb 12 19:48:42.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.36:22-10.200.12.6:34764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:42.814701 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:48:42.815288 systemd-logind[1325]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:48:42.816302 systemd-logind[1325]: Removed session 12. Feb 12 19:48:47.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.36:22-10.200.12.6:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:47.917577 systemd[1]: Started sshd@10-10.200.8.36:22-10.200.12.6:34808.service. Feb 12 19:48:47.940260 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 19:48:47.940354 kernel: audit: type=1130 audit(1707767327.916:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.36:22-10.200.12.6:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:48.554000 audit[5787]: USER_ACCT pid=5787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.555219 sshd[5787]: Accepted publickey for core from 10.200.12.6 port 34808 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:48.572000 audit[5787]: CRED_ACQ pid=5787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.574161 sshd[5787]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:48.582504 systemd[1]: Started session-13.scope. Feb 12 19:48:48.583478 systemd-logind[1325]: New session 13 of user core. Feb 12 19:48:48.591834 kernel: audit: type=1101 audit(1707767328.554:1543): pid=5787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.591932 kernel: audit: type=1103 audit(1707767328.572:1544): pid=5787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.591962 kernel: audit: type=1006 audit(1707767328.572:1545): pid=5787 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 19:48:48.605891 kernel: audit: type=1300 audit(1707767328.572:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd983c9fb0 a2=3 a3=0 items=0 ppid=1 pid=5787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:48.572000 audit[5787]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd983c9fb0 a2=3 a3=0 items=0 ppid=1 pid=5787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:48.572000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:48.619887 kernel: audit: type=1327 audit(1707767328.572:1545): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:48.588000 audit[5787]: USER_START pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.625889 kernel: audit: type=1105 audit(1707767328.588:1546): pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.590000 audit[5789]: CRED_ACQ pid=5789 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:48.658780 kernel: audit: type=1103 audit(1707767328.590:1547): pid=5789 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.053037 sshd[5787]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:49.053000 audit[5787]: USER_END pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.056372 systemd[1]: sshd@10-10.200.8.36:22-10.200.12.6:34808.service: Deactivated successfully. Feb 12 19:48:49.057185 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:48:49.066543 systemd-logind[1325]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:48:49.067475 systemd-logind[1325]: Removed session 13. Feb 12 19:48:49.053000 audit[5787]: CRED_DISP pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.090048 kernel: audit: type=1106 audit(1707767329.053:1548): pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.090171 kernel: audit: type=1104 audit(1707767329.053:1549): pid=5787 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.36:22-10.200.12.6:34808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:49.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.36:22-10.200.12.6:34810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:49.158534 systemd[1]: Started sshd@11-10.200.8.36:22-10.200.12.6:34810.service. Feb 12 19:48:49.774000 audit[5800]: USER_ACCT pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.775734 sshd[5800]: Accepted publickey for core from 10.200.12.6 port 34810 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:49.776000 audit[5800]: CRED_ACQ pid=5800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.776000 audit[5800]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd969827b0 a2=3 a3=0 items=0 ppid=1 pid=5800 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:49.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:49.777393 sshd[5800]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:49.782554 systemd[1]: Started session-14.scope. Feb 12 19:48:49.783017 systemd-logind[1325]: New session 14 of user core. Feb 12 19:48:49.786000 audit[5800]: USER_START pid=5800 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:49.788000 audit[5802]: CRED_ACQ pid=5802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:50.912514 sshd[5800]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:50.913000 audit[5800]: USER_END pid=5800 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:50.913000 audit[5800]: CRED_DISP pid=5800 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:50.916125 systemd[1]: sshd@11-10.200.8.36:22-10.200.12.6:34810.service: Deactivated successfully. Feb 12 19:48:50.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.36:22-10.200.12.6:34810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:50.917235 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:48:50.918112 systemd-logind[1325]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:48:50.919247 systemd-logind[1325]: Removed session 14. Feb 12 19:48:51.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.36:22-10.200.12.6:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:51.035476 systemd[1]: Started sshd@12-10.200.8.36:22-10.200.12.6:34826.service. Feb 12 19:48:51.648000 audit[5811]: USER_ACCT pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:51.649811 sshd[5811]: Accepted publickey for core from 10.200.12.6 port 34826 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:51.650000 audit[5811]: CRED_ACQ pid=5811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:51.650000 audit[5811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68975ef0 a2=3 a3=0 items=0 ppid=1 pid=5811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:51.650000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:51.651340 sshd[5811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:51.656687 systemd[1]: Started session-15.scope. Feb 12 19:48:51.657165 systemd-logind[1325]: New session 15 of user core. Feb 12 19:48:51.657000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:51.657000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eef380 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:51.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:51.659000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:51.659000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002877680 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:48:51.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:48:51.662000 audit[5811]: USER_START pid=5811 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:51.663000 audit[5814]: CRED_ACQ pid=5814 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:52.136000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.136000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015e736e0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.136000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.136000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015e73710 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.147918 sshd[5811]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:52.148000 audit[5811]: USER_END pid=5811 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:52.148000 audit[5811]: CRED_DISP pid=5811 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:52.151163 systemd[1]: sshd@12-10.200.8.36:22-10.200.12.6:34826.service: Deactivated successfully. Feb 12 19:48:52.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.36:22-10.200.12.6:34826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:52.152122 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:48:52.152644 systemd-logind[1325]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:48:52.152000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.152000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015f609a0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.152000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.153896 systemd-logind[1325]: Removed session 15. Feb 12 19:48:52.191000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.191000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015e737d0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.223000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.223000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:48:52.223000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c015e97c20 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.223000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c015fb4660 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:48:52.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:48:52.257148 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.IZcsMV.mount: Deactivated successfully. Feb 12 19:48:57.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.36:22-10.200.12.6:60942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:57.252263 systemd[1]: Started sshd@13-10.200.8.36:22-10.200.12.6:60942.service. Feb 12 19:48:57.274104 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 19:48:57.274218 kernel: audit: type=1130 audit(1707767337.251:1577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.36:22-10.200.12.6:60942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:57.886932 kernel: audit: type=1101 audit(1707767337.867:1578): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.867000 audit[5847]: USER_ACCT pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.887208 sshd[5847]: Accepted publickey for core from 10.200.12.6 port 60942 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:57.887414 sshd[5847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:57.886000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.896011 systemd[1]: Started session-16.scope. Feb 12 19:48:57.896820 systemd-logind[1325]: New session 16 of user core. Feb 12 19:48:57.915894 kernel: audit: type=1103 audit(1707767337.886:1579): pid=5847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.916029 kernel: audit: type=1006 audit(1707767337.886:1580): pid=5847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:48:57.916071 kernel: audit: type=1300 audit(1707767337.886:1580): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc28624da0 a2=3 a3=0 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:57.886000 audit[5847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc28624da0 a2=3 a3=0 items=0 ppid=1 pid=5847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:57.933256 kernel: audit: type=1327 audit(1707767337.886:1580): proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:57.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:57.903000 audit[5847]: USER_START pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.957397 kernel: audit: type=1105 audit(1707767337.903:1581): pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.967543 kernel: audit: type=1103 audit(1707767337.906:1582): pid=5851 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:57.906000 audit[5851]: CRED_ACQ pid=5851 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:58.372616 sshd[5847]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:58.373000 audit[5847]: USER_END pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:58.376112 systemd[1]: sshd@13-10.200.8.36:22-10.200.12.6:60942.service: Deactivated successfully. Feb 12 19:48:58.377045 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:48:58.385551 systemd-logind[1325]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:48:58.386458 systemd-logind[1325]: Removed session 16. Feb 12 19:48:58.373000 audit[5847]: CRED_DISP pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:58.393887 kernel: audit: type=1106 audit(1707767338.373:1583): pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:58.393924 kernel: audit: type=1104 audit(1707767338.373:1584): pid=5847 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:58.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.36:22-10.200.12.6:60942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:00.143192 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.MYmx93.mount: Deactivated successfully. Feb 12 19:49:00.656000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:00.656000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f61f80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:00.656000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:00.682000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:00.682000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:00.682000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f61fa0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:00.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:00.682000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b22f80 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:00.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:00.683000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:00.683000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b22fa0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:00.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:03.479552 systemd[1]: Started sshd@14-10.200.8.36:22-10.200.12.6:60950.service. Feb 12 19:49:03.503114 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:49:03.503214 kernel: audit: type=1130 audit(1707767343.479:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.36:22-10.200.12.6:60950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:03.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.36:22-10.200.12.6:60950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:04.093000 audit[5906]: USER_ACCT pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.096048 sshd[5906]: Accepted publickey for core from 10.200.12.6 port 60950 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:04.113000 audit[5906]: CRED_ACQ pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.115401 sshd[5906]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:04.120793 systemd[1]: Started session-17.scope. Feb 12 19:49:04.121752 systemd-logind[1325]: New session 17 of user core. Feb 12 19:49:04.131939 kernel: audit: type=1101 audit(1707767344.093:1591): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.132051 kernel: audit: type=1103 audit(1707767344.113:1592): pid=5906 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.133885 kernel: audit: type=1006 audit(1707767344.114:1593): pid=5906 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:49:04.114000 audit[5906]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed235da00 a2=3 a3=0 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.159201 kernel: audit: type=1300 audit(1707767344.114:1593): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed235da00 a2=3 a3=0 items=0 ppid=1 pid=5906 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:04.165207 kernel: audit: type=1327 audit(1707767344.114:1593): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:04.127000 audit[5906]: USER_START pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.165879 kernel: audit: type=1105 audit(1707767344.127:1594): pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.184470 kernel: audit: type=1103 audit(1707767344.129:1595): pid=5908 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.129000 audit[5908]: CRED_ACQ pid=5908 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.568739 systemd[1]: run-containerd-runc-k8s.io-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075-runc.bke3wE.mount: Deactivated successfully. Feb 12 19:49:04.593003 sshd[5906]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:04.600000 audit[5906]: USER_END pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.624919 kernel: audit: type=1106 audit(1707767344.600:1596): pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.626059 systemd[1]: run-containerd-runc-k8s.io-abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc-runc.ntVZSH.mount: Deactivated successfully. Feb 12 19:49:04.627137 systemd[1]: sshd@14-10.200.8.36:22-10.200.12.6:60950.service: Deactivated successfully. Feb 12 19:49:04.628258 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:49:04.600000 audit[5906]: CRED_DISP pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.629161 systemd-logind[1325]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:49:04.646153 kernel: audit: type=1104 audit(1707767344.600:1597): pid=5906 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:04.648280 systemd-logind[1325]: Removed session 17. Feb 12 19:49:04.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.36:22-10.200.12.6:60950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:09.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.36:22-10.200.12.6:58510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:09.697308 systemd[1]: Started sshd@15-10.200.8.36:22-10.200.12.6:58510.service. Feb 12 19:49:09.702467 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:09.702562 kernel: audit: type=1130 audit(1707767349.696:1599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.36:22-10.200.12.6:58510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:10.315000 audit[5960]: USER_ACCT pid=5960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.317002 sshd[5960]: Accepted publickey for core from 10.200.12.6 port 58510 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:10.334000 audit[5960]: CRED_ACQ pid=5960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.335685 sshd[5960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:10.341077 systemd[1]: Started session-18.scope. Feb 12 19:49:10.342063 systemd-logind[1325]: New session 18 of user core. Feb 12 19:49:10.351883 kernel: audit: type=1101 audit(1707767350.315:1600): pid=5960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.351974 kernel: audit: type=1103 audit(1707767350.334:1601): pid=5960 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.352002 kernel: audit: type=1006 audit(1707767350.334:1602): pid=5960 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 19:49:10.334000 audit[5960]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cdc7a20 a2=3 a3=0 items=0 ppid=1 pid=5960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.379303 kernel: audit: type=1300 audit(1707767350.334:1602): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cdc7a20 a2=3 a3=0 items=0 ppid=1 pid=5960 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:10.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:10.345000 audit[5960]: USER_START pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.403627 kernel: audit: type=1327 audit(1707767350.334:1602): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:10.403708 kernel: audit: type=1105 audit(1707767350.345:1603): pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.403739 kernel: audit: type=1103 audit(1707767350.345:1604): pid=5962 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.345000 audit[5962]: CRED_ACQ pid=5962 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.809496 sshd[5960]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:10.810000 audit[5960]: USER_END pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.813382 systemd-logind[1325]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:49:10.814894 systemd[1]: sshd@15-10.200.8.36:22-10.200.12.6:58510.service: Deactivated successfully. Feb 12 19:49:10.815826 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:49:10.817271 systemd-logind[1325]: Removed session 18. Feb 12 19:49:10.810000 audit[5960]: CRED_DISP pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.844394 kernel: audit: type=1106 audit(1707767350.810:1605): pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.844493 kernel: audit: type=1104 audit(1707767350.810:1606): pid=5960 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:10.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.36:22-10.200.12.6:58510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:10.913727 systemd[1]: Started sshd@16-10.200.8.36:22-10.200.12.6:58512.service. Feb 12 19:49:10.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.36:22-10.200.12.6:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:11.542000 audit[5972]: USER_ACCT pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:11.543646 sshd[5972]: Accepted publickey for core from 10.200.12.6 port 58512 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:11.545299 sshd[5972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:11.544000 audit[5972]: CRED_ACQ pid=5972 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:11.544000 audit[5972]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7a7a700 a2=3 a3=0 items=0 ppid=1 pid=5972 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:11.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:11.550629 systemd[1]: Started session-19.scope. Feb 12 19:49:11.551101 systemd-logind[1325]: New session 19 of user core. Feb 12 19:49:11.554000 audit[5972]: USER_START pid=5972 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:11.556000 audit[5986]: CRED_ACQ pid=5986 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.094562 sshd[5972]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:12.095000 audit[5972]: USER_END pid=5972 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.095000 audit[5972]: CRED_DISP pid=5972 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.097730 systemd[1]: sshd@16-10.200.8.36:22-10.200.12.6:58512.service: Deactivated successfully. Feb 12 19:49:12.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.36:22-10.200.12.6:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:12.098815 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:49:12.099559 systemd-logind[1325]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:49:12.100407 systemd-logind[1325]: Removed session 19. Feb 12 19:49:12.199997 systemd[1]: Started sshd@17-10.200.8.36:22-10.200.12.6:58526.service. Feb 12 19:49:12.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.36:22-10.200.12.6:58526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:12.815000 audit[5993]: USER_ACCT pid=5993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.816788 sshd[5993]: Accepted publickey for core from 10.200.12.6 port 58526 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:12.816000 audit[5993]: CRED_ACQ pid=5993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.817000 audit[5993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc01c6d160 a2=3 a3=0 items=0 ppid=1 pid=5993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:12.817000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:12.818249 sshd[5993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:12.823265 systemd-logind[1325]: New session 20 of user core. Feb 12 19:49:12.823756 systemd[1]: Started session-20.scope. Feb 12 19:49:12.827000 audit[5993]: USER_START pid=5993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:12.829000 audit[5998]: CRED_ACQ pid=5998 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:14.217000 audit[6008]: NETFILTER_CFG table=filter:137 family=2 entries=20 op=nft_register_rule pid=6008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.217000 audit[6008]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd2d48c030 a2=0 a3=7ffd2d48c01c items=0 ppid=2616 pid=6008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.218000 audit[6008]: NETFILTER_CFG table=nat:138 family=2 entries=22 op=nft_register_rule pid=6008 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.218000 audit[6008]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffd2d48c030 a2=0 a3=31030 items=0 ppid=2616 pid=6008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.249000 audit[6010]: NETFILTER_CFG table=filter:139 family=2 entries=32 op=nft_register_rule pid=6010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.249000 audit[6010]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffdfff417b0 a2=0 a3=7ffdfff4179c items=0 ppid=2616 pid=6010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.250000 audit[6010]: NETFILTER_CFG table=nat:140 family=2 entries=22 op=nft_register_rule pid=6010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.250000 audit[6010]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffdfff417b0 a2=0 a3=31030 items=0 ppid=2616 pid=6010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.310402 sshd[5993]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:14.311000 audit[5993]: USER_END pid=5993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:14.311000 audit[5993]: CRED_DISP pid=5993 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:14.314249 systemd[1]: sshd@17-10.200.8.36:22-10.200.12.6:58526.service: Deactivated successfully. Feb 12 19:49:14.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.36:22-10.200.12.6:58526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:14.315362 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:49:14.316331 systemd-logind[1325]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:49:14.317344 systemd-logind[1325]: Removed session 20. Feb 12 19:49:14.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.36:22-10.200.12.6:58538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:14.414385 systemd[1]: Started sshd@18-10.200.8.36:22-10.200.12.6:58538.service. Feb 12 19:49:15.029000 audit[6013]: USER_ACCT pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.030310 sshd[6013]: Accepted publickey for core from 10.200.12.6 port 58538 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:15.035425 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 12 19:49:15.035503 kernel: audit: type=1101 audit(1707767355.029:1631): pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.035155 sshd[6013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:15.040420 systemd[1]: Started session-21.scope. Feb 12 19:49:15.041790 systemd-logind[1325]: New session 21 of user core. Feb 12 19:49:15.033000 audit[6013]: CRED_ACQ pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.067923 kernel: audit: type=1103 audit(1707767355.033:1632): pid=6013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.078423 kernel: audit: type=1006 audit(1707767355.034:1633): pid=6013 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 19:49:15.034000 audit[6013]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe58c013d0 a2=3 a3=0 items=0 ppid=1 pid=6013 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:15.078900 kernel: audit: type=1300 audit(1707767355.034:1633): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe58c013d0 a2=3 a3=0 items=0 ppid=1 pid=6013 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:15.034000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:15.097052 kernel: audit: type=1327 audit(1707767355.034:1633): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:15.045000 audit[6013]: USER_START pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.120249 kernel: audit: type=1105 audit(1707767355.045:1634): pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.120339 kernel: audit: type=1103 audit(1707767355.047:1635): pid=6017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.047000 audit[6017]: CRED_ACQ pid=6017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.727223 sshd[6013]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:15.728000 audit[6013]: USER_END pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.731049 systemd[1]: sshd@18-10.200.8.36:22-10.200.12.6:58538.service: Deactivated successfully. Feb 12 19:49:15.731997 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:49:15.733653 systemd-logind[1325]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:49:15.734717 systemd-logind[1325]: Removed session 21. Feb 12 19:49:15.728000 audit[6013]: CRED_DISP pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.748879 kernel: audit: type=1106 audit(1707767355.728:1636): pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.748928 kernel: audit: type=1104 audit(1707767355.728:1637): pid=6013 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:15.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.36:22-10.200.12.6:58538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:15.778791 kernel: audit: type=1131 audit(1707767355.728:1638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.36:22-10.200.12.6:58538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:15.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.36:22-10.200.12.6:58550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:15.833599 systemd[1]: Started sshd@19-10.200.8.36:22-10.200.12.6:58550.service. Feb 12 19:49:16.447000 audit[6024]: USER_ACCT pid=6024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.448238 sshd[6024]: Accepted publickey for core from 10.200.12.6 port 58550 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:16.448000 audit[6024]: CRED_ACQ pid=6024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.448000 audit[6024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2ab8dd0 a2=3 a3=0 items=0 ppid=1 pid=6024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:16.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:16.450210 sshd[6024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:16.455948 systemd[1]: Started session-22.scope. Feb 12 19:49:16.456557 systemd-logind[1325]: New session 22 of user core. Feb 12 19:49:16.460000 audit[6024]: USER_START pid=6024 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.461000 audit[6026]: CRED_ACQ pid=6026 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.962440 sshd[6024]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:16.963000 audit[6024]: USER_END pid=6024 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.963000 audit[6024]: CRED_DISP pid=6024 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:16.966040 systemd[1]: sshd@19-10.200.8.36:22-10.200.12.6:58550.service: Deactivated successfully. Feb 12 19:49:16.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.36:22-10.200.12.6:58550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:16.967266 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:49:16.968192 systemd-logind[1325]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:49:16.969262 systemd-logind[1325]: Removed session 22. Feb 12 19:49:20.621000 audit[6036]: NETFILTER_CFG table=filter:141 family=2 entries=20 op=nft_register_rule pid=6036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.636841 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 12 19:49:20.638757 kernel: audit: type=1325 audit(1707767360.621:1648): table=filter:141 family=2 entries=20 op=nft_register_rule pid=6036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.638802 kernel: audit: type=1300 audit(1707767360.621:1648): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc6b9de790 a2=0 a3=7ffc6b9de77c items=0 ppid=2616 pid=6036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.621000 audit[6036]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc6b9de790 a2=0 a3=7ffc6b9de77c items=0 ppid=2616 pid=6036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.657890 kernel: audit: type=1327 audit(1707767360.621:1648): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:20.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:20.621000 audit[6036]: NETFILTER_CFG table=nat:142 family=2 entries=106 op=nft_register_chain pid=6036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.676639 kernel: audit: type=1325 audit(1707767360.621:1649): table=nat:142 family=2 entries=106 op=nft_register_chain pid=6036 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.621000 audit[6036]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffc6b9de790 a2=0 a3=7ffc6b9de77c items=0 ppid=2616 pid=6036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:20.706456 kernel: audit: type=1300 audit(1707767360.621:1649): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffc6b9de790 a2=0 a3=7ffc6b9de77c items=0 ppid=2616 pid=6036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.706534 kernel: audit: type=1327 audit(1707767360.621:1649): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:22.068102 systemd[1]: Started sshd@20-10.200.8.36:22-10.200.12.6:39780.service. Feb 12 19:49:22.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.36:22-10.200.12.6:39780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:22.086924 kernel: audit: type=1130 audit(1707767362.070:1650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.36:22-10.200.12.6:39780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:22.277462 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.K50yY1.mount: Deactivated successfully. Feb 12 19:49:22.695000 audit[6039]: USER_ACCT pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.696736 sshd[6039]: Accepted publickey for core from 10.200.12.6 port 39780 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:22.698498 sshd[6039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:22.695000 audit[6039]: CRED_ACQ pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.725504 systemd[1]: Started session-23.scope. Feb 12 19:49:22.726609 systemd-logind[1325]: New session 23 of user core. Feb 12 19:49:22.734550 kernel: audit: type=1101 audit(1707767362.695:1651): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.734628 kernel: audit: type=1103 audit(1707767362.695:1652): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.695000 audit[6039]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdafce6450 a2=3 a3=0 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:22.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:22.730000 audit[6039]: USER_START pid=6039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.734000 audit[6061]: CRED_ACQ pid=6061 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:22.746057 kernel: audit: type=1006 audit(1707767362.695:1653): pid=6039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:49:23.197403 sshd[6039]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:23.197000 audit[6039]: USER_END pid=6039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:23.198000 audit[6039]: CRED_DISP pid=6039 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:23.201117 systemd-logind[1325]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:49:23.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.36:22-10.200.12.6:39780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:23.202151 systemd[1]: sshd@20-10.200.8.36:22-10.200.12.6:39780.service: Deactivated successfully. Feb 12 19:49:23.203127 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:49:23.204766 systemd-logind[1325]: Removed session 23. Feb 12 19:49:28.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.36:22-10.200.12.6:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:28.303324 systemd[1]: Started sshd@21-10.200.8.36:22-10.200.12.6:55704.service. Feb 12 19:49:28.309019 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:49:28.309102 kernel: audit: type=1130 audit(1707767368.303:1659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.36:22-10.200.12.6:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:28.920000 audit[6071]: USER_ACCT pid=6071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:28.921000 audit[6071]: CRED_ACQ pid=6071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:28.940260 sshd[6071]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:28.941029 kernel: audit: type=1101 audit(1707767368.920:1660): pid=6071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:28.941066 kernel: audit: type=1103 audit(1707767368.921:1661): pid=6071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:28.941090 sshd[6071]: Accepted publickey for core from 10.200.12.6 port 55704 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:28.948149 systemd-logind[1325]: New session 24 of user core. Feb 12 19:49:28.948750 systemd[1]: Started session-24.scope. Feb 12 19:49:28.921000 audit[6071]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb080e330 a2=3 a3=0 items=0 ppid=1 pid=6071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:28.985063 kernel: audit: type=1006 audit(1707767368.921:1662): pid=6071 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:49:28.985130 kernel: audit: type=1300 audit(1707767368.921:1662): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb080e330 a2=3 a3=0 items=0 ppid=1 pid=6071 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:28.985164 kernel: audit: type=1327 audit(1707767368.921:1662): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:28.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:28.949000 audit[6071]: USER_START pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:28.954000 audit[6073]: CRED_ACQ pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.027164 kernel: audit: type=1105 audit(1707767368.949:1663): pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.027260 kernel: audit: type=1103 audit(1707767368.954:1664): pid=6073 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.428091 sshd[6071]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:29.429000 audit[6071]: USER_END pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.431906 systemd[1]: sshd@21-10.200.8.36:22-10.200.12.6:55704.service: Deactivated successfully. Feb 12 19:49:29.432699 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:49:29.433969 systemd-logind[1325]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:49:29.434849 systemd-logind[1325]: Removed session 24. Feb 12 19:49:29.429000 audit[6071]: CRED_DISP pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.465615 kernel: audit: type=1106 audit(1707767369.429:1665): pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.465700 kernel: audit: type=1104 audit(1707767369.429:1666): pid=6071 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:29.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.36:22-10.200.12.6:55704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:30.139678 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.NrHTrE.mount: Deactivated successfully. Feb 12 19:49:34.557433 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:34.557557 kernel: audit: type=1130 audit(1707767374.534:1668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.36:22-10.200.12.6:55712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:34.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.36:22-10.200.12.6:55712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:34.534640 systemd[1]: Started sshd@22-10.200.8.36:22-10.200.12.6:55712.service. Feb 12 19:49:34.595211 systemd[1]: run-containerd-runc-k8s.io-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075-runc.s3KU5R.mount: Deactivated successfully. Feb 12 19:49:35.151000 audit[6107]: USER_ACCT pid=6107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.170661 sshd[6107]: Accepted publickey for core from 10.200.12.6 port 55712 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:35.170945 kernel: audit: type=1101 audit(1707767375.151:1669): pid=6107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.170000 audit[6107]: CRED_ACQ pid=6107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.171573 sshd[6107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:35.176580 systemd[1]: Started session-25.scope. Feb 12 19:49:35.177569 systemd-logind[1325]: New session 25 of user core. Feb 12 19:49:35.188844 kernel: audit: type=1103 audit(1707767375.170:1670): pid=6107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.189020 kernel: audit: type=1006 audit(1707767375.170:1671): pid=6107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:49:35.170000 audit[6107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85120f00 a2=3 a3=0 items=0 ppid=1 pid=6107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:35.198901 kernel: audit: type=1300 audit(1707767375.170:1671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85120f00 a2=3 a3=0 items=0 ppid=1 pid=6107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:35.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:35.222520 kernel: audit: type=1327 audit(1707767375.170:1671): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:35.187000 audit[6107]: USER_START pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.240888 kernel: audit: type=1105 audit(1707767375.187:1672): pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.190000 audit[6152]: CRED_ACQ pid=6152 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.256942 kernel: audit: type=1103 audit(1707767375.190:1673): pid=6152 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.647747 sshd[6107]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:35.648000 audit[6107]: USER_END pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.650601 systemd[1]: sshd@22-10.200.8.36:22-10.200.12.6:55712.service: Deactivated successfully. Feb 12 19:49:35.651423 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:49:35.653117 systemd-logind[1325]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:49:35.654044 systemd-logind[1325]: Removed session 25. Feb 12 19:49:35.648000 audit[6107]: CRED_DISP pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.685330 kernel: audit: type=1106 audit(1707767375.648:1674): pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.685419 kernel: audit: type=1104 audit(1707767375.648:1675): pid=6107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:35.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.36:22-10.200.12.6:55712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:40.023000 audit[5037]: AVC avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:49:40.028542 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:49:40.028630 kernel: audit: type=1400 audit(1707767380.023:1677): avc: denied { watch } for pid=5037 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.1512902446/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c37,c680 tclass=file permissive=0 Feb 12 19:49:40.023000 audit[5037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fe60a0 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:49:40.047890 kernel: audit: type=1300 audit(1707767380.023:1677): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000fe60a0 a2=fc6 a3=0 items=0 ppid=4921 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c37,c680 key=(null) Feb 12 19:49:40.023000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:40.066888 kernel: audit: type=1327 audit(1707767380.023:1677): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:40.569000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:49:40.569000 audit[5075]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b6a6a0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:49:40.608624 kernel: audit: type=1400 audit(1707767380.569:1678): avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_46_34.2758886351/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c143,c938 tclass=file permissive=0 Feb 12 19:49:40.608723 kernel: audit: type=1300 audit(1707767380.569:1678): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b6a6a0 a2=fc6 a3=0 items=0 ppid=4970 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c143,c938 key=(null) Feb 12 19:49:40.608748 kernel: audit: type=1327 audit(1707767380.569:1678): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:40.569000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:49:40.754110 systemd[1]: Started sshd@23-10.200.8.36:22-10.200.12.6:47448.service. Feb 12 19:49:40.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.36:22-10.200.12.6:47448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:40.773895 kernel: audit: type=1130 audit(1707767380.753:1679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.36:22-10.200.12.6:47448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:41.369000 audit[6164]: USER_ACCT pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.372658 sshd[6164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:41.389721 sshd[6164]: Accepted publickey for core from 10.200.12.6 port 47448 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:41.390025 kernel: audit: type=1101 audit(1707767381.369:1680): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.371000 audit[6164]: CRED_ACQ pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.410716 systemd-logind[1325]: New session 26 of user core. Feb 12 19:49:41.411837 systemd[1]: Started session-26.scope. Feb 12 19:49:41.420947 kernel: audit: type=1103 audit(1707767381.371:1681): pid=6164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.421038 kernel: audit: type=1006 audit(1707767381.371:1682): pid=6164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:49:41.371000 audit[6164]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef0a9fea0 a2=3 a3=0 items=0 ppid=1 pid=6164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:41.371000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:41.415000 audit[6164]: USER_START pid=6164 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.415000 audit[6166]: CRED_ACQ pid=6166 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.861549 sshd[6164]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:41.863000 audit[6164]: USER_END pid=6164 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.863000 audit[6164]: CRED_DISP pid=6164 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:41.865778 systemd[1]: sshd@23-10.200.8.36:22-10.200.12.6:47448.service: Deactivated successfully. Feb 12 19:49:41.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.36:22-10.200.12.6:47448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:41.867027 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:49:41.867843 systemd-logind[1325]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:49:41.868844 systemd-logind[1325]: Removed session 26. Feb 12 19:49:46.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.36:22-10.200.12.6:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:46.966397 systemd[1]: Started sshd@24-10.200.8.36:22-10.200.12.6:47460.service. Feb 12 19:49:46.971712 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:49:46.971782 kernel: audit: type=1130 audit(1707767386.965:1688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.36:22-10.200.12.6:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:47.673000 audit[6179]: USER_ACCT pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.674572 sshd[6179]: Accepted publickey for core from 10.200.12.6 port 47460 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:47.693887 kernel: audit: type=1101 audit(1707767387.673:1689): pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.694478 sshd[6179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:47.692000 audit[6179]: CRED_ACQ pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.699968 systemd[1]: Started session-27.scope. Feb 12 19:49:47.701045 systemd-logind[1325]: New session 27 of user core. Feb 12 19:49:47.724133 kernel: audit: type=1103 audit(1707767387.692:1690): pid=6179 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.724228 kernel: audit: type=1006 audit(1707767387.693:1691): pid=6179 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:49:47.724263 kernel: audit: type=1300 audit(1707767387.693:1691): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd754938d0 a2=3 a3=0 items=0 ppid=1 pid=6179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.693000 audit[6179]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd754938d0 a2=3 a3=0 items=0 ppid=1 pid=6179 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.746798 kernel: audit: type=1327 audit(1707767387.693:1691): proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:47.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:47.704000 audit[6179]: USER_START pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.709000 audit[6181]: CRED_ACQ pid=6181 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.780645 kernel: audit: type=1105 audit(1707767387.704:1692): pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:47.780758 kernel: audit: type=1103 audit(1707767387.709:1693): pid=6181 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:48.177050 sshd[6179]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:48.177000 audit[6179]: USER_END pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:48.180988 systemd[1]: sshd@24-10.200.8.36:22-10.200.12.6:47460.service: Deactivated successfully. Feb 12 19:49:48.182744 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:49:48.183517 systemd-logind[1325]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:49:48.184582 systemd-logind[1325]: Removed session 27. Feb 12 19:49:48.178000 audit[6179]: CRED_DISP pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:48.213604 kernel: audit: type=1106 audit(1707767388.177:1694): pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:48.213693 kernel: audit: type=1104 audit(1707767388.178:1695): pid=6179 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:48.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.36:22-10.200.12.6:47460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:51.658000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:51.658000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c48d40 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:51.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:51.659000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:51.659000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021c95f0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:49:51.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:49:52.136000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.142233 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:49:52.142326 kernel: audit: type=1400 audit(1707767392.136:1699): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.136000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.179890 kernel: audit: type=1400 audit(1707767392.136:1700): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.179984 kernel: audit: type=1300 audit(1707767392.136:1700): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00843a7b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.136000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00843a7b0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.212276 kernel: audit: type=1327 audit(1707767392.136:1700): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.136000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0086dd740 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.212888 kernel: audit: type=1300 audit(1707767392.136:1699): arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0086dd740 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.151000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.271568 kernel: audit: type=1327 audit(1707767392.136:1699): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.271670 kernel: audit: type=1400 audit(1707767392.151:1701): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.151000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007c819c0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.292954 kernel: audit: type=1300 audit(1707767392.151:1701): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007c819c0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.320888 kernel: audit: type=1327 audit(1707767392.151:1701): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.195000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.195000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00843a9c0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.233000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.233000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c007a65c00 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.233000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:52.233000 audit[2333]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c0086dd7d0 a2=fc6 a3=0 items=0 ppid=2169 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 key=(null) Feb 12 19:49:52.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:49:52.340910 kernel: audit: type=1400 audit(1707767392.195:1702): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c404,c770 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:49:53.282802 systemd[1]: Started sshd@25-10.200.8.36:22-10.200.12.6:38026.service. Feb 12 19:49:53.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.36:22-10.200.12.6:38026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:53.894000 audit[6208]: USER_ACCT pid=6208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:53.895878 sshd[6208]: Accepted publickey for core from 10.200.12.6 port 38026 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:49:53.896000 audit[6208]: CRED_ACQ pid=6208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:53.896000 audit[6208]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce0ea0e20 a2=3 a3=0 items=0 ppid=1 pid=6208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:53.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:49:53.897607 sshd[6208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:49:53.903072 systemd[1]: Started session-28.scope. Feb 12 19:49:53.903534 systemd-logind[1325]: New session 28 of user core. Feb 12 19:49:53.908000 audit[6208]: USER_START pid=6208 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:53.909000 audit[6210]: CRED_ACQ pid=6210 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:54.384011 sshd[6208]: pam_unix(sshd:session): session closed for user core Feb 12 19:49:54.384000 audit[6208]: USER_END pid=6208 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:54.384000 audit[6208]: CRED_DISP pid=6208 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:49:54.386922 systemd[1]: sshd@25-10.200.8.36:22-10.200.12.6:38026.service: Deactivated successfully. Feb 12 19:49:54.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.36:22-10.200.12.6:38026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:49:54.387988 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 19:49:54.388702 systemd-logind[1325]: Session 28 logged out. Waiting for processes to exit. Feb 12 19:49:54.389510 systemd-logind[1325]: Removed session 28. Feb 12 19:50:00.657000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.662947 kernel: kauditd_printk_skb: 19 callbacks suppressed Feb 12 19:50:00.663051 kernel: audit: type=1400 audit(1707767400.657:1714): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.657000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ef680 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.700514 kernel: audit: type=1300 audit(1707767400.657:1714): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ef680 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.700600 kernel: audit: type=1327 audit(1707767400.657:1714): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.683000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.733945 kernel: audit: type=1400 audit(1707767400.683:1715): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.734032 kernel: audit: type=1300 audit(1707767400.683:1715): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c490e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.683000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c490e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.772449 kernel: audit: type=1327 audit(1707767400.683:1715): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.773059 kernel: audit: type=1400 audit(1707767400.683:1716): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.683000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.683000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ef7a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.809636 kernel: audit: type=1300 audit(1707767400.683:1716): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ef7a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.826937 kernel: audit: type=1327 audit(1707767400.683:1716): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:00.827031 kernel: audit: type=1400 audit(1707767400.684:1717): avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.684000 audit[2340]: AVC avc: denied { watch } for pid=2340 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:00.684000 audit[2340]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029ef7c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:00.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:04.571732 systemd[1]: run-containerd-runc-k8s.io-9a2c1a80912fe2ffdda0b26ce9b99a4e26655dc7a39165f146ef36fa40e58075-runc.OZ92Hl.mount: Deactivated successfully. Feb 12 19:50:04.605164 systemd[1]: run-containerd-runc-k8s.io-abfe4ccd12a584ae55f5f526b013fe16efc69632a7564f31c6ee4c80056af6fc-runc.ka2jtG.mount: Deactivated successfully. Feb 12 19:50:08.151000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:50:08.151700 systemd[1]: cri-containerd-5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f.scope: Deactivated successfully. Feb 12 19:50:08.152066 systemd[1]: cri-containerd-5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f.scope: Consumed 6.085s CPU time. Feb 12 19:50:08.158476 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:50:08.158575 kernel: audit: type=1334 audit(1707767408.151:1718): prog-id=118 op=UNLOAD Feb 12 19:50:08.165000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:50:08.171941 kernel: audit: type=1334 audit(1707767408.165:1719): prog-id=121 op=UNLOAD Feb 12 19:50:08.175932 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f-rootfs.mount: Deactivated successfully. Feb 12 19:50:08.177416 env[1337]: time="2024-02-12T19:50:08.177367649Z" level=info msg="shim disconnected" id=5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f Feb 12 19:50:08.177816 env[1337]: time="2024-02-12T19:50:08.177418850Z" level=warning msg="cleaning up after shim disconnected" id=5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f namespace=k8s.io Feb 12 19:50:08.177816 env[1337]: time="2024-02-12T19:50:08.177431950Z" level=info msg="cleaning up dead shim" Feb 12 19:50:08.185190 env[1337]: time="2024-02-12T19:50:08.185159579Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:50:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6320 runtime=io.containerd.runc.v2\n" Feb 12 19:50:08.453750 kubelet[2467]: I0212 19:50:08.453660 2467 scope.go:117] "RemoveContainer" containerID="5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f" Feb 12 19:50:08.456264 env[1337]: time="2024-02-12T19:50:08.456222107Z" level=info msg="CreateContainer within sandbox \"b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 19:50:08.523219 env[1337]: time="2024-02-12T19:50:08.523177261Z" level=info msg="CreateContainer within sandbox \"b04e07177a218f2d712e52cb4492bf726c23019a912195873b3df7599a153ae2\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95\"" Feb 12 19:50:08.523893 env[1337]: time="2024-02-12T19:50:08.523838464Z" level=info msg="StartContainer for \"1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95\"" Feb 12 19:50:08.572644 systemd[1]: Started cri-containerd-1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95.scope. Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600896 kernel: audit: type=1400 audit(1707767408.585:1720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.615289 kernel: audit: type=1400 audit(1707767408.585:1721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.640778 kernel: audit: type=1400 audit(1707767408.585:1722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.640857 kernel: audit: type=1400 audit(1707767408.585:1723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.654042 kernel: audit: type=1400 audit(1707767408.585:1724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.669918 kernel: audit: type=1400 audit(1707767408.585:1725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.669993 kernel: audit: type=1400 audit(1707767408.585:1726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.687697 env[1337]: time="2024-02-12T19:50:08.687657885Z" level=info msg="StartContainer for \"1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95\" returns successfully" Feb 12 19:50:08.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit: BPF prog-id=212 op=LOAD Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=2763 pid=6341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:08.697028 kernel: audit: type=1400 audit(1707767408.585:1727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303239356134333762613833393832616135343838343861356664 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=8 items=0 ppid=2763 pid=6341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:08.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303239356134333762613833393832616135343838343861356664 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.600000 audit: BPF prog-id=213 op=LOAD Feb 12 19:50:08.600000 audit[6341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0002cded0 items=0 ppid=2763 pid=6341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:08.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303239356134333762613833393832616135343838343861356664 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.613000 audit: BPF prog-id=214 op=LOAD Feb 12 19:50:08.613000 audit[6341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c0002cdf18 items=0 ppid=2763 pid=6341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:08.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303239356134333762613833393832616135343838343861356664 Feb 12 19:50:08.614000 audit: BPF prog-id=214 op=UNLOAD Feb 12 19:50:08.614000 audit: BPF prog-id=213 op=UNLOAD Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { perfmon } for pid=6341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit[6341]: AVC avc: denied { bpf } for pid=6341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:08.614000 audit: BPF prog-id=215 op=LOAD Feb 12 19:50:08.614000 audit[6341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000328328 items=0 ppid=2763 pid=6341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:08.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163303239356134333762613833393832616135343838343861356664 Feb 12 19:50:09.176449 systemd[1]: run-containerd-runc-k8s.io-1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95-runc.jgL0ZY.mount: Deactivated successfully. Feb 12 19:50:09.667484 systemd[1]: cri-containerd-23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507.scope: Deactivated successfully. Feb 12 19:50:09.667856 systemd[1]: cri-containerd-23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507.scope: Consumed 3.952s CPU time. Feb 12 19:50:09.671000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:50:09.671000 audit: BPF prog-id=106 op=UNLOAD Feb 12 19:50:09.693047 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507-rootfs.mount: Deactivated successfully. Feb 12 19:50:09.696591 env[1337]: time="2024-02-12T19:50:09.696545108Z" level=info msg="shim disconnected" id=23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507 Feb 12 19:50:09.696940 env[1337]: time="2024-02-12T19:50:09.696593608Z" level=warning msg="cleaning up after shim disconnected" id=23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507 namespace=k8s.io Feb 12 19:50:09.696940 env[1337]: time="2024-02-12T19:50:09.696606408Z" level=info msg="cleaning up dead shim" Feb 12 19:50:09.704101 env[1337]: time="2024-02-12T19:50:09.704070136Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:50:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6382 runtime=io.containerd.runc.v2\n" Feb 12 19:50:10.462636 kubelet[2467]: I0212 19:50:10.462586 2467 scope.go:117] "RemoveContainer" containerID="23ad3f70fcfd95fe4b0212161e838463fb5a83bf60f8ada98c072bcf6e9d5507" Feb 12 19:50:10.465012 env[1337]: time="2024-02-12T19:50:10.464965715Z" level=info msg="CreateContainer within sandbox \"2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 19:50:10.490607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2864960355.mount: Deactivated successfully. Feb 12 19:50:10.504087 env[1337]: time="2024-02-12T19:50:10.504046663Z" level=info msg="CreateContainer within sandbox \"2457fa4a8a93a4b74a9592edd5046f642c12546b912b8921ca906aabcdd6232b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"ba484a3a1c06313be1b40bbb2f623b9229e2fed8cd37dddb927813ff37dfdb2b\"" Feb 12 19:50:10.504486 env[1337]: time="2024-02-12T19:50:10.504456164Z" level=info msg="StartContainer for \"ba484a3a1c06313be1b40bbb2f623b9229e2fed8cd37dddb927813ff37dfdb2b\"" Feb 12 19:50:10.533992 systemd[1]: Started cri-containerd-ba484a3a1c06313be1b40bbb2f623b9229e2fed8cd37dddb927813ff37dfdb2b.scope. Feb 12 19:50:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit: BPF prog-id=216 op=LOAD Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2194 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:10.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343834613361316330363331336265316234306262623266363233 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2194 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:10.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343834613361316330363331336265316234306262623266363233 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.549000 audit: BPF prog-id=217 op=LOAD Feb 12 19:50:10.549000 audit[6401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003a6310 items=0 ppid=2194 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:10.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343834613361316330363331336265316234306262623266363233 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit: BPF prog-id=218 op=LOAD Feb 12 19:50:10.550000 audit[6401]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003a6358 items=0 ppid=2194 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:10.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343834613361316330363331336265316234306262623266363233 Feb 12 19:50:10.550000 audit: BPF prog-id=218 op=UNLOAD Feb 12 19:50:10.550000 audit: BPF prog-id=217 op=UNLOAD Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { perfmon } for pid=6401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit[6401]: AVC avc: denied { bpf } for pid=6401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:10.550000 audit: BPF prog-id=219 op=LOAD Feb 12 19:50:10.550000 audit[6401]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003a6768 items=0 ppid=2194 pid=6401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:10.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261343834613361316330363331336265316234306262623266363233 Feb 12 19:50:10.587003 env[1337]: time="2024-02-12T19:50:10.586957076Z" level=info msg="StartContainer for \"ba484a3a1c06313be1b40bbb2f623b9229e2fed8cd37dddb927813ff37dfdb2b\" returns successfully" Feb 12 19:50:10.999000 audit[6413]: AVC avc: denied { watch } for pid=6413 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:10.999000 audit[6413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009f2020 a2=fc6 a3=0 items=0 ppid=2194 pid=6413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:10.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:10.999000 audit[6413]: AVC avc: denied { watch } for pid=6413 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:50:10.999000 audit[6413]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009fc0f0 a2=fc6 a3=0 items=0 ppid=2194 pid=6413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c378,c755 key=(null) Feb 12 19:50:10.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:50:11.485374 systemd[1]: run-containerd-runc-k8s.io-ba484a3a1c06313be1b40bbb2f623b9229e2fed8cd37dddb927813ff37dfdb2b-runc.l8LAWK.mount: Deactivated successfully. Feb 12 19:50:11.631378 kubelet[2467]: E0212 19:50:11.631337 2467 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.36:35584->10.200.8.22:2379: read: connection timed out" Feb 12 19:50:11.636981 systemd[1]: cri-containerd-e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261.scope: Deactivated successfully. Feb 12 19:50:11.637293 systemd[1]: cri-containerd-e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261.scope: Consumed 1.779s CPU time. Feb 12 19:50:11.640000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:50:11.640000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:50:11.659065 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261-rootfs.mount: Deactivated successfully. Feb 12 19:50:11.660882 env[1337]: time="2024-02-12T19:50:11.660818033Z" level=info msg="shim disconnected" id=e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261 Feb 12 19:50:11.661221 env[1337]: time="2024-02-12T19:50:11.660880433Z" level=warning msg="cleaning up after shim disconnected" id=e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261 namespace=k8s.io Feb 12 19:50:11.661221 env[1337]: time="2024-02-12T19:50:11.660893433Z" level=info msg="cleaning up dead shim" Feb 12 19:50:11.668996 env[1337]: time="2024-02-12T19:50:11.668911263Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:50:11Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6441 runtime=io.containerd.runc.v2\n" Feb 12 19:50:12.459026 kubelet[2467]: E0212 19:50:12.458920 2467 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-3bedefc55b.17b335676c07f41e", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-3bedefc55b", UID:"04f8df5d0cc80a414f38b6eab9272749", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-3bedefc55b"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 50, 2, 13914142, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 50, 2, 13914142, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-3bedefc55b"}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.36:35408->10.200.8.22:2379: read: connection timed out' (will not retry!) Feb 12 19:50:12.471189 kubelet[2467]: I0212 19:50:12.471167 2467 scope.go:117] "RemoveContainer" containerID="e6b0af7534e361a37063dd208456fec898022a58e686d3154322ed8e4a80f261" Feb 12 19:50:12.473306 env[1337]: time="2024-02-12T19:50:12.473266898Z" level=info msg="CreateContainer within sandbox \"899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 19:50:12.508254 env[1337]: time="2024-02-12T19:50:12.508212829Z" level=info msg="CreateContainer within sandbox \"899cdbdfc37d5782a0ca070c6a42c82c3fc997cf8cc89343d8a2dbd29083bcd5\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"f82a74d30df02ce0f9c63bf465b60693dc70cba405577a93b723d18c26a90d37\"" Feb 12 19:50:12.508694 env[1337]: time="2024-02-12T19:50:12.508659431Z" level=info msg="StartContainer for \"f82a74d30df02ce0f9c63bf465b60693dc70cba405577a93b723d18c26a90d37\"" Feb 12 19:50:12.528247 systemd[1]: Started cri-containerd-f82a74d30df02ce0f9c63bf465b60693dc70cba405577a93b723d18c26a90d37.scope. Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.548000 audit: BPF prog-id=220 op=LOAD Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2158 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:12.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326137346433306466303263653066396336336266343635623630 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2158 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:12.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326137346433306466303263653066396336336266343635623630 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit: BPF prog-id=221 op=LOAD Feb 12 19:50:12.549000 audit[6464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000308540 items=0 ppid=2158 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:12.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326137346433306466303263653066396336336266343635623630 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit: BPF prog-id=222 op=LOAD Feb 12 19:50:12.549000 audit[6464]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000308588 items=0 ppid=2158 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:12.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326137346433306466303263653066396336336266343635623630 Feb 12 19:50:12.549000 audit: BPF prog-id=222 op=UNLOAD Feb 12 19:50:12.549000 audit: BPF prog-id=221 op=UNLOAD Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { perfmon } for pid=6464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit[6464]: AVC avc: denied { bpf } for pid=6464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:50:12.549000 audit: BPF prog-id=223 op=LOAD Feb 12 19:50:12.549000 audit[6464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000308998 items=0 ppid=2158 pid=6464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:50:12.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638326137346433306466303263653066396336336266343635623630 Feb 12 19:50:12.582216 env[1337]: time="2024-02-12T19:50:12.582177508Z" level=info msg="StartContainer for \"f82a74d30df02ce0f9c63bf465b60693dc70cba405577a93b723d18c26a90d37\" returns successfully" Feb 12 19:50:18.475183 kubelet[2467]: I0212 19:50:18.475133 2467 status_manager.go:853] "Failed to get status for pod" podUID="04f8df5d0cc80a414f38b6eab9272749" pod="kube-system/kube-apiserver-ci-3510.3.2-a-3bedefc55b" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.36:35510->10.200.8.22:2379: read: connection timed out" Feb 12 19:50:20.206000 audit: BPF prog-id=212 op=UNLOAD Feb 12 19:50:20.206936 systemd[1]: cri-containerd-1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95.scope: Deactivated successfully. Feb 12 19:50:20.211899 kernel: kauditd_printk_skb: 173 callbacks suppressed Feb 12 19:50:20.212012 kernel: audit: type=1334 audit(1707767420.206:1780): prog-id=212 op=UNLOAD Feb 12 19:50:20.218000 audit: BPF prog-id=215 op=UNLOAD Feb 12 19:50:20.224892 kernel: audit: type=1334 audit(1707767420.218:1781): prog-id=215 op=UNLOAD Feb 12 19:50:20.233347 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95-rootfs.mount: Deactivated successfully. Feb 12 19:50:20.293825 env[1337]: time="2024-02-12T19:50:20.293752916Z" level=info msg="shim disconnected" id=1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95 Feb 12 19:50:20.293825 env[1337]: time="2024-02-12T19:50:20.293817016Z" level=warning msg="cleaning up after shim disconnected" id=1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95 namespace=k8s.io Feb 12 19:50:20.293825 env[1337]: time="2024-02-12T19:50:20.293831616Z" level=info msg="cleaning up dead shim" Feb 12 19:50:20.303397 env[1337]: time="2024-02-12T19:50:20.303346752Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:50:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6508 runtime=io.containerd.runc.v2\n" Feb 12 19:50:20.494517 kubelet[2467]: I0212 19:50:20.494379 2467 scope.go:117] "RemoveContainer" containerID="5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f" Feb 12 19:50:20.495705 kubelet[2467]: I0212 19:50:20.495677 2467 scope.go:117] "RemoveContainer" containerID="1c0295a437ba83982aa548848a5fd1fbcaa9f1c444f5368617725334b0e10a95" Feb 12 19:50:20.496066 kubelet[2467]: E0212 19:50:20.496018 2467 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-55585899bf-8zknm_tigera-operator(77789baa-74bc-43d2-8543-18bdc0e13259)\"" pod="tigera-operator/tigera-operator-55585899bf-8zknm" podUID="77789baa-74bc-43d2-8543-18bdc0e13259" Feb 12 19:50:20.497223 env[1337]: time="2024-02-12T19:50:20.497186074Z" level=info msg="RemoveContainer for \"5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f\"" Feb 12 19:50:20.506248 env[1337]: time="2024-02-12T19:50:20.506212408Z" level=info msg="RemoveContainer for \"5065c7e002f20b9b883bdb7fe085fe3d01fc6e39467e76f614c7e6bbc810019f\" returns successfully" Feb 12 19:50:21.632624 kubelet[2467]: E0212 19:50:21.632214 2467 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-3bedefc55b?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:22.259195 systemd[1]: run-containerd-runc-k8s.io-4f58bb64b19163d0a2d865d1468580c843b0fe90e796973a75d2b8474b13a573-runc.4p7gPU.mount: Deactivated successfully. Feb 12 19:50:29.658892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.672215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.686279 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.700293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.715049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.728701 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.739647 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.751953 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.764439 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.764592 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.764728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.764858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.765011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.776950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.777188 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.789086 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.789308 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.800938 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.806821 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.807060 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.818507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.818818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.830974 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.831196 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.843529 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.843785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.855447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.855693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.867029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.879341 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.879507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.879641 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.895929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.924195 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.924361 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.933807 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.933991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.934127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.934253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.934387 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.934520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.947044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.947277 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.947417 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.958026 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.984007 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.984165 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.984303 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.984436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.984568 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:29.991481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.002932 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.003149 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.003290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.013541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.013755 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.024155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.024380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.034778 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.035015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.045800 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.057438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.057677 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.057827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.068427 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.068667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.079367 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.079581 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.089957 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.090164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.101050 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.101457 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.112523 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.129136 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.134766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.179634 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.179786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.179941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180078 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180207 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180334 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180476 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180611 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180739 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.180875 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.181011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.151669 systemd[1]: run-containerd-runc-k8s.io-594b46fa0814f74ff801a3891cf58ba5909a93010f516a458a0ebb814c709bad-runc.bP576N.mount: Deactivated successfully. Feb 12 19:50:30.196458 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.196735 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.196897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:30.201935 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001