Feb 12 19:57:54.032594 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:57:54.032630 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:57:54.032644 kernel: BIOS-provided physical RAM map: Feb 12 19:57:54.032653 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:57:54.032663 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 12 19:57:54.032672 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 12 19:57:54.032686 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 12 19:57:54.032697 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 12 19:57:54.032706 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 12 19:57:54.032715 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 12 19:57:54.032725 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 12 19:57:54.032734 kernel: printk: bootconsole [earlyser0] enabled Feb 12 19:57:54.032743 kernel: NX (Execute Disable) protection: active Feb 12 19:57:54.032750 kernel: efi: EFI v2.70 by Microsoft Feb 12 19:57:54.032763 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c9a98 RNG=0x3ffd1018 Feb 12 19:57:54.032771 kernel: random: crng init done Feb 12 19:57:54.032779 kernel: SMBIOS 3.1.0 present. Feb 12 19:57:54.032787 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:57:54.032795 kernel: Hypervisor detected: Microsoft Hyper-V Feb 12 19:57:54.032801 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 12 19:57:54.032807 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 12 19:57:54.032816 kernel: Hyper-V: Nested features: 0x1e0101 Feb 12 19:57:54.032825 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 12 19:57:54.032834 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 12 19:57:54.032840 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 12 19:57:54.032847 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 12 19:57:54.032853 kernel: tsc: Detected 2593.908 MHz processor Feb 12 19:57:54.032860 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:57:54.032867 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:57:54.032875 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 12 19:57:54.032882 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:57:54.032889 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 12 19:57:54.032897 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 12 19:57:54.032906 kernel: Using GB pages for direct mapping Feb 12 19:57:54.032913 kernel: Secure boot disabled Feb 12 19:57:54.032920 kernel: ACPI: Early table checksum verification disabled Feb 12 19:57:54.032926 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 12 19:57:54.032936 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032942 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032949 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:57:54.032961 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 12 19:57:54.032970 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032977 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032984 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032990 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.032997 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.033009 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.033016 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:57:54.033023 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 12 19:57:54.033030 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 12 19:57:54.033036 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 12 19:57:54.033044 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 12 19:57:54.033053 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 12 19:57:54.033060 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 12 19:57:54.033068 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 12 19:57:54.033075 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 12 19:57:54.033082 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 12 19:57:54.033089 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 12 19:57:54.033098 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:57:54.033106 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:57:54.033113 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 12 19:57:54.033121 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 12 19:57:54.033129 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 12 19:57:54.033138 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 12 19:57:54.033145 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 12 19:57:54.033152 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 12 19:57:54.033161 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 12 19:57:54.033168 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 12 19:57:54.033175 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 12 19:57:54.033182 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 12 19:57:54.033191 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 12 19:57:54.033198 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 12 19:57:54.033207 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 12 19:57:54.033217 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 12 19:57:54.033224 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 12 19:57:54.033230 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 12 19:57:54.033240 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 12 19:57:54.033247 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 12 19:57:54.033254 kernel: Zone ranges: Feb 12 19:57:54.033261 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:57:54.033271 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 19:57:54.033280 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:57:54.033287 kernel: Movable zone start for each node Feb 12 19:57:54.033295 kernel: Early memory node ranges Feb 12 19:57:54.033303 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:57:54.033310 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 12 19:57:54.033317 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 12 19:57:54.033327 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:57:54.033334 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 12 19:57:54.033344 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:57:54.033353 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:57:54.033359 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 12 19:57:54.033367 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 12 19:57:54.033373 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 12 19:57:54.033383 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:57:54.033390 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:57:54.033400 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:57:54.033407 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 12 19:57:54.033413 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:57:54.033425 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 12 19:57:54.033432 kernel: Booting paravirtualized kernel on Hyper-V Feb 12 19:57:54.033441 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:57:54.033449 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:57:54.033456 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:57:54.033463 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:57:54.033472 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:57:54.033479 kernel: Hyper-V: PV spinlocks enabled Feb 12 19:57:54.033486 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:57:54.033495 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 12 19:57:54.033512 kernel: Policy zone: Normal Feb 12 19:57:54.033521 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:57:54.033528 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:57:54.033535 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 19:57:54.033541 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:57:54.033548 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:57:54.033556 kernel: Memory: 8081204K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 12 19:57:54.033567 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:57:54.033574 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:57:54.033591 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:57:54.033600 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:57:54.033608 kernel: rcu: RCU event tracing is enabled. Feb 12 19:57:54.033616 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:57:54.033627 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:57:54.033634 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:57:54.033641 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:57:54.033652 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:57:54.033659 kernel: Using NULL legacy PIC Feb 12 19:57:54.033668 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 12 19:57:54.033675 kernel: Console: colour dummy device 80x25 Feb 12 19:57:54.033686 kernel: printk: console [tty1] enabled Feb 12 19:57:54.033693 kernel: printk: console [ttyS0] enabled Feb 12 19:57:54.033700 kernel: printk: bootconsole [earlyser0] disabled Feb 12 19:57:54.033713 kernel: ACPI: Core revision 20210730 Feb 12 19:57:54.033720 kernel: Failed to register legacy timer interrupt Feb 12 19:57:54.033727 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:57:54.033734 kernel: Hyper-V: Using IPI hypercalls Feb 12 19:57:54.033742 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593908) Feb 12 19:57:54.033752 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 19:57:54.033759 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 19:57:54.033768 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:57:54.033777 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:57:54.033784 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:57:54.033795 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:57:54.033805 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 19:57:54.033815 kernel: RETBleed: Vulnerable Feb 12 19:57:54.033822 kernel: Speculative Store Bypass: Vulnerable Feb 12 19:57:54.033831 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:57:54.033839 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:57:54.033849 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 19:57:54.033856 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:57:54.033865 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:57:54.033874 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:57:54.033886 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 19:57:54.033893 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 19:57:54.033900 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 19:57:54.033907 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:57:54.033916 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 12 19:57:54.033924 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 12 19:57:54.033931 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 12 19:57:54.033940 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 12 19:57:54.033949 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:57:54.033956 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:57:54.033964 kernel: LSM: Security Framework initializing Feb 12 19:57:54.033973 kernel: SELinux: Initializing. Feb 12 19:57:54.033984 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:57:54.033993 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:57:54.034000 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 19:57:54.034009 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 19:57:54.034018 kernel: signal: max sigframe size: 3632 Feb 12 19:57:54.034028 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:57:54.034035 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:57:54.034042 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:57:54.034053 kernel: x86: Booting SMP configuration: Feb 12 19:57:54.034060 kernel: .... node #0, CPUs: #1 Feb 12 19:57:54.034069 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 12 19:57:54.034078 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 19:57:54.034088 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:57:54.034095 kernel: smpboot: Max logical packages: 1 Feb 12 19:57:54.034102 kernel: smpboot: Total of 2 processors activated (10375.63 BogoMIPS) Feb 12 19:57:54.034109 kernel: devtmpfs: initialized Feb 12 19:57:54.034116 kernel: x86/mm: Memory block size: 128MB Feb 12 19:57:54.034125 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 12 19:57:54.034135 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:57:54.034143 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:57:54.034153 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:57:54.034160 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:57:54.034168 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:57:54.034178 kernel: audit: type=2000 audit(1707767873.023:1): state=initialized audit_enabled=0 res=1 Feb 12 19:57:54.034185 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:57:54.034193 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:57:54.034203 kernel: cpuidle: using governor menu Feb 12 19:57:54.034212 kernel: ACPI: bus type PCI registered Feb 12 19:57:54.034219 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:57:54.034226 kernel: dca service started, version 1.12.1 Feb 12 19:57:54.034234 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:57:54.034244 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:57:54.034252 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:57:54.034261 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:57:54.034270 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:57:54.034277 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:57:54.034286 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:57:54.034296 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:57:54.034303 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:57:54.034313 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:57:54.034321 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:57:54.034328 kernel: ACPI: Interpreter enabled Feb 12 19:57:54.034337 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:57:54.034346 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:57:54.034353 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:57:54.034362 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 12 19:57:54.034369 kernel: iommu: Default domain type: Translated Feb 12 19:57:54.034380 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:57:54.034387 kernel: vgaarb: loaded Feb 12 19:57:54.034394 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:57:54.034402 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:57:54.034409 kernel: PTP clock support registered Feb 12 19:57:54.034419 kernel: Registered efivars operations Feb 12 19:57:54.034426 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:57:54.034433 kernel: PCI: System does not support PCI Feb 12 19:57:54.034445 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 12 19:57:54.034453 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:57:54.034460 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:57:54.034467 kernel: pnp: PnP ACPI init Feb 12 19:57:54.034477 kernel: pnp: PnP ACPI: found 3 devices Feb 12 19:57:54.034485 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:57:54.034492 kernel: NET: Registered PF_INET protocol family Feb 12 19:57:54.034500 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:57:54.034516 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 19:57:54.034524 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:57:54.034531 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:57:54.034540 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 19:57:54.034549 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 19:57:54.034556 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:57:54.034567 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:57:54.034574 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:57:54.034581 kernel: NET: Registered PF_XDP protocol family Feb 12 19:57:54.034590 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:57:54.034598 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 19:57:54.034606 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 12 19:57:54.034616 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:57:54.034623 kernel: Initialise system trusted keyrings Feb 12 19:57:54.034633 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 19:57:54.034641 kernel: Key type asymmetric registered Feb 12 19:57:54.034648 kernel: Asymmetric key parser 'x509' registered Feb 12 19:57:54.034655 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:57:54.034666 kernel: io scheduler mq-deadline registered Feb 12 19:57:54.034674 kernel: io scheduler kyber registered Feb 12 19:57:54.034681 kernel: io scheduler bfq registered Feb 12 19:57:54.034692 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:57:54.034699 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:57:54.034706 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:57:54.034713 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 19:57:54.034721 kernel: i8042: PNP: No PS/2 controller found. Feb 12 19:57:54.034842 kernel: rtc_cmos 00:02: registered as rtc0 Feb 12 19:57:54.034924 kernel: rtc_cmos 00:02: setting system clock to 2024-02-12T19:57:53 UTC (1707767873) Feb 12 19:57:54.035003 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 12 19:57:54.035014 kernel: fail to initialize ptp_kvm Feb 12 19:57:54.035021 kernel: intel_pstate: CPU model not supported Feb 12 19:57:54.035029 kernel: efifb: probing for efifb Feb 12 19:57:54.035036 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:57:54.035046 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:57:54.035054 kernel: efifb: scrolling: redraw Feb 12 19:57:54.035067 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:57:54.035074 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:57:54.035081 kernel: fb0: EFI VGA frame buffer device Feb 12 19:57:54.035090 kernel: pstore: Registered efi as persistent store backend Feb 12 19:57:54.035099 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:57:54.035106 kernel: Segment Routing with IPv6 Feb 12 19:57:54.035113 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:57:54.035122 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:57:54.035131 kernel: Key type dns_resolver registered Feb 12 19:57:54.035140 kernel: IPI shorthand broadcast: enabled Feb 12 19:57:54.035148 kernel: sched_clock: Marking stable (769013900, 22726000)->(1001141300, -209401400) Feb 12 19:57:54.035158 kernel: registered taskstats version 1 Feb 12 19:57:54.035167 kernel: Loading compiled-in X.509 certificates Feb 12 19:57:54.035175 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:57:54.035182 kernel: Key type .fscrypt registered Feb 12 19:57:54.035189 kernel: Key type fscrypt-provisioning registered Feb 12 19:57:54.035199 kernel: pstore: Using crash dump compression: deflate Feb 12 19:57:54.035209 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:57:54.035216 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:57:54.035226 kernel: ima: No architecture policies found Feb 12 19:57:54.035234 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:57:54.035241 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:57:54.035248 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:57:54.035255 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:57:54.035265 kernel: Run /init as init process Feb 12 19:57:54.035273 kernel: with arguments: Feb 12 19:57:54.035281 kernel: /init Feb 12 19:57:54.035291 kernel: with environment: Feb 12 19:57:54.035299 kernel: HOME=/ Feb 12 19:57:54.035306 kernel: TERM=linux Feb 12 19:57:54.035316 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:57:54.035325 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:57:54.035337 systemd[1]: Detected virtualization microsoft. Feb 12 19:57:54.035345 systemd[1]: Detected architecture x86-64. Feb 12 19:57:54.035357 systemd[1]: Running in initrd. Feb 12 19:57:54.035364 systemd[1]: No hostname configured, using default hostname. Feb 12 19:57:54.035371 systemd[1]: Hostname set to . Feb 12 19:57:54.035382 systemd[1]: Initializing machine ID from random generator. Feb 12 19:57:54.035390 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:57:54.035398 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:57:54.035409 systemd[1]: Reached target cryptsetup.target. Feb 12 19:57:54.035416 systemd[1]: Reached target paths.target. Feb 12 19:57:54.035424 systemd[1]: Reached target slices.target. Feb 12 19:57:54.035436 systemd[1]: Reached target swap.target. Feb 12 19:57:54.035444 systemd[1]: Reached target timers.target. Feb 12 19:57:54.035452 systemd[1]: Listening on iscsid.socket. Feb 12 19:57:54.035462 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:57:54.035473 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:57:54.035481 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:57:54.035489 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:57:54.035499 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:57:54.035516 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:57:54.035527 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:57:54.035534 systemd[1]: Reached target sockets.target. Feb 12 19:57:54.035544 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:57:54.035553 systemd[1]: Finished network-cleanup.service. Feb 12 19:57:54.035561 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:57:54.035571 systemd[1]: Starting systemd-journald.service... Feb 12 19:57:54.035579 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:57:54.035588 systemd[1]: Starting systemd-resolved.service... Feb 12 19:57:54.035597 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:57:54.035607 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:57:54.035619 systemd-journald[183]: Journal started Feb 12 19:57:54.035662 systemd-journald[183]: Runtime Journal (/run/log/journal/c4f1df05d0f642a084145d92ecc0e0a1) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:57:54.020753 systemd-modules-load[184]: Inserted module 'overlay' Feb 12 19:57:54.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.062513 kernel: audit: type=1130 audit(1707767874.050:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.074385 systemd[1]: Started systemd-journald.service. Feb 12 19:57:54.074417 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:57:54.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.077075 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:57:54.094262 kernel: Bridge firewalling registered Feb 12 19:57:54.094278 kernel: audit: type=1130 audit(1707767874.076:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.093213 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 12 19:57:54.099840 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:57:54.105114 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:57:54.110353 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:57:54.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.128602 kernel: audit: type=1130 audit(1707767874.099:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.144455 kernel: audit: type=1130 audit(1707767874.104:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.141555 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:57:54.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.161221 kernel: audit: type=1130 audit(1707767874.144:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.166527 kernel: SCSI subsystem initialized Feb 12 19:57:54.178253 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:57:54.203253 kernel: audit: type=1130 audit(1707767874.180:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.180562 systemd-resolved[185]: Positive Trust Anchors: Feb 12 19:57:54.205396 dracut-cmdline[201]: dracut-dracut-053 Feb 12 19:57:54.205396 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 12 19:57:54.205396 dracut-cmdline[201]: BEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:57:54.255522 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:57:54.255557 kernel: audit: type=1130 audit(1707767874.198:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.255581 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:57:54.255596 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:57:54.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.180571 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:57:54.180603 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:57:54.181570 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:57:54.192329 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 12 19:57:54.196180 systemd[1]: Started systemd-resolved.service. Feb 12 19:57:54.198292 systemd[1]: Reached target nss-lookup.target. Feb 12 19:57:54.285494 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 12 19:57:54.287391 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:57:54.294435 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:57:54.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.316519 kernel: audit: type=1130 audit(1707767874.293:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.318023 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:57:54.336879 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:57:54.336915 kernel: audit: type=1130 audit(1707767874.322:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.349532 kernel: iscsi: registered transport (tcp) Feb 12 19:57:54.374743 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:57:54.374808 kernel: QLogic iSCSI HBA Driver Feb 12 19:57:54.403753 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:57:54.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.407612 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:57:54.458532 kernel: raid6: avx512x4 gen() 18660 MB/s Feb 12 19:57:54.478521 kernel: raid6: avx512x4 xor() 7822 MB/s Feb 12 19:57:54.498517 kernel: raid6: avx512x2 gen() 18767 MB/s Feb 12 19:57:54.518522 kernel: raid6: avx512x2 xor() 30202 MB/s Feb 12 19:57:54.538516 kernel: raid6: avx512x1 gen() 18729 MB/s Feb 12 19:57:54.558517 kernel: raid6: avx512x1 xor() 27035 MB/s Feb 12 19:57:54.578516 kernel: raid6: avx2x4 gen() 18750 MB/s Feb 12 19:57:54.598515 kernel: raid6: avx2x4 xor() 7609 MB/s Feb 12 19:57:54.618514 kernel: raid6: avx2x2 gen() 18758 MB/s Feb 12 19:57:54.638517 kernel: raid6: avx2x2 xor() 22293 MB/s Feb 12 19:57:54.658515 kernel: raid6: avx2x1 gen() 14138 MB/s Feb 12 19:57:54.678515 kernel: raid6: avx2x1 xor() 19519 MB/s Feb 12 19:57:54.698516 kernel: raid6: sse2x4 gen() 11729 MB/s Feb 12 19:57:54.718514 kernel: raid6: sse2x4 xor() 7404 MB/s Feb 12 19:57:54.738514 kernel: raid6: sse2x2 gen() 12991 MB/s Feb 12 19:57:54.759516 kernel: raid6: sse2x2 xor() 7545 MB/s Feb 12 19:57:54.779514 kernel: raid6: sse2x1 gen() 11663 MB/s Feb 12 19:57:54.802509 kernel: raid6: sse2x1 xor() 5899 MB/s Feb 12 19:57:54.802536 kernel: raid6: using algorithm avx512x2 gen() 18767 MB/s Feb 12 19:57:54.802548 kernel: raid6: .... xor() 30202 MB/s, rmw enabled Feb 12 19:57:54.806047 kernel: raid6: using avx512x2 recovery algorithm Feb 12 19:57:54.825529 kernel: xor: automatically using best checksumming function avx Feb 12 19:57:54.921530 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:57:54.929827 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:57:54.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.934000 audit: BPF prog-id=7 op=LOAD Feb 12 19:57:54.934000 audit: BPF prog-id=8 op=LOAD Feb 12 19:57:54.935282 systemd[1]: Starting systemd-udevd.service... Feb 12 19:57:54.949660 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:57:54.954324 systemd[1]: Started systemd-udevd.service. Feb 12 19:57:54.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:54.957291 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:57:54.974023 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Feb 12 19:57:55.004064 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:57:55.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:55.007668 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:57:55.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:55.044768 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:57:55.084523 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:57:55.105373 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:57:55.105438 kernel: AES CTR mode by8 optimization enabled Feb 12 19:57:55.128285 kernel: hv_vmbus: Vmbus version:5.2 Feb 12 19:57:55.149184 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:57:55.149239 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:57:55.159528 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:57:55.165526 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:57:55.172518 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:57:55.172551 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:57:55.184106 kernel: scsi host0: storvsc_host_t Feb 12 19:57:55.187022 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:57:55.187042 kernel: scsi host1: storvsc_host_t Feb 12 19:57:55.198397 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:57:55.198438 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:57:55.198589 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:57:55.227310 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:57:55.227591 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:57:55.229525 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:57:55.243586 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:57:55.243818 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:57:55.247751 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:57:55.247931 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:57:55.248056 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:57:55.264525 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:57:55.269548 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:57:55.564996 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:57:55.607529 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (429) Feb 12 19:57:55.620285 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:57:55.728276 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:57:55.743431 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:57:55.746429 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:57:55.753439 systemd[1]: Starting disk-uuid.service... Feb 12 19:57:56.301984 kernel: hv_netvsc 002248a1-8bc6-0022-48a1-8bc6002248a1 eth0: VF slot 1 added Feb 12 19:57:56.309535 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:57:56.315521 kernel: hv_pci 3c9ab499-62aa-464e-82f6-d5b40e9495a8: PCI VMBus probing: Using version 0x10004 Feb 12 19:57:56.327927 kernel: hv_pci 3c9ab499-62aa-464e-82f6-d5b40e9495a8: PCI host bridge to bus 62aa:00 Feb 12 19:57:56.328189 kernel: pci_bus 62aa:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 12 19:57:56.333198 kernel: pci_bus 62aa:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:57:56.338965 kernel: pci 62aa:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 12 19:57:56.348562 kernel: pci 62aa:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:57:56.367767 kernel: pci 62aa:00:02.0: enabling Extended Tags Feb 12 19:57:56.382562 kernel: pci 62aa:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 62aa:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 12 19:57:56.391949 kernel: pci_bus 62aa:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:57:56.392143 kernel: pci 62aa:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:57:56.484533 kernel: mlx5_core 62aa:00:02.0: firmware version: 14.30.1350 Feb 12 19:57:56.647620 kernel: mlx5_core 62aa:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 19:57:56.781527 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:57:56.781869 disk-uuid[540]: The operation has completed successfully. Feb 12 19:57:56.814533 kernel: mlx5_core 62aa:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 12 19:57:56.824527 kernel: mlx5_core 62aa:00:02.0: mlx5e_tc_post_act_init:40:(pid 278): firmware level support is missing Feb 12 19:57:56.855022 kernel: hv_netvsc 002248a1-8bc6-0022-48a1-8bc6002248a1 eth0: VF registering: eth1 Feb 12 19:57:56.855244 kernel: mlx5_core 62aa:00:02.0 eth1: joined to eth0 Feb 12 19:57:56.869531 kernel: mlx5_core 62aa:00:02.0 enP25258s1: renamed from eth1 Feb 12 19:57:56.885949 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:57:56.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:56.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:56.886068 systemd[1]: Finished disk-uuid.service. Feb 12 19:57:56.888464 systemd[1]: Starting verity-setup.service... Feb 12 19:57:56.927537 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:57:57.100551 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:57:57.105700 systemd[1]: Finished verity-setup.service. Feb 12 19:57:57.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.110701 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:57:57.185543 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:57:57.185671 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:57:57.189731 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:57:57.194198 systemd[1]: Starting ignition-setup.service... Feb 12 19:57:57.199947 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:57:57.219278 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:57:57.219335 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:57:57.219351 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:57:57.274078 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:57:57.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.279000 audit: BPF prog-id=9 op=LOAD Feb 12 19:57:57.280680 systemd[1]: Starting systemd-networkd.service... Feb 12 19:57:57.310114 systemd-networkd[821]: lo: Link UP Feb 12 19:57:57.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.310127 systemd-networkd[821]: lo: Gained carrier Feb 12 19:57:57.310833 systemd-networkd[821]: Enumeration completed Feb 12 19:57:57.311331 systemd[1]: Started systemd-networkd.service. Feb 12 19:57:57.313081 systemd-networkd[821]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:57:57.315456 systemd[1]: Reached target network.target. Feb 12 19:57:57.318814 systemd[1]: Starting iscsiuio.service... Feb 12 19:57:57.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.333745 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:57:57.334109 systemd[1]: Started iscsiuio.service. Feb 12 19:57:57.339549 systemd[1]: Starting iscsid.service... Feb 12 19:57:57.348417 iscsid[830]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:57:57.348417 iscsid[830]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:57:57.348417 iscsid[830]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:57:57.348417 iscsid[830]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:57:57.348417 iscsid[830]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:57:57.348417 iscsid[830]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:57:57.348417 iscsid[830]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:57:57.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.348929 systemd[1]: Started iscsid.service. Feb 12 19:57:57.363292 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:57:57.397850 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:57:57.407531 kernel: mlx5_core 62aa:00:02.0 enP25258s1: Link up Feb 12 19:57:57.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.408685 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:57:57.412799 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:57:57.415110 systemd[1]: Reached target remote-fs.target. Feb 12 19:57:57.421951 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:57:57.433779 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:57:57.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.477710 systemd[1]: Finished ignition-setup.service. Feb 12 19:57:57.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:57:57.480110 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:57:58.454534 kernel: hv_netvsc 002248a1-8bc6-0022-48a1-8bc6002248a1 eth0: Data path switched to VF: enP25258s1 Feb 12 19:57:58.459527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:57:58.459703 systemd-networkd[821]: enP25258s1: Link UP Feb 12 19:57:58.459843 systemd-networkd[821]: eth0: Link UP Feb 12 19:57:58.460037 systemd-networkd[821]: eth0: Gained carrier Feb 12 19:57:58.467740 systemd-networkd[821]: enP25258s1: Gained carrier Feb 12 19:57:58.498643 systemd-networkd[821]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:57:59.945791 systemd-networkd[821]: eth0: Gained IPv6LL Feb 12 19:58:00.235310 ignition[845]: Ignition 2.14.0 Feb 12 19:58:00.235327 ignition[845]: Stage: fetch-offline Feb 12 19:58:00.235434 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:00.235484 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:00.313005 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:00.313205 ignition[845]: parsed url from cmdline: "" Feb 12 19:58:00.313209 ignition[845]: no config URL provided Feb 12 19:58:00.313215 ignition[845]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:58:00.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.322349 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:58:00.347185 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 19:58:00.347217 kernel: audit: type=1130 audit(1707767880.324:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.313223 ignition[845]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:58:00.328259 systemd[1]: Starting ignition-fetch.service... Feb 12 19:58:00.313228 ignition[845]: failed to fetch config: resource requires networking Feb 12 19:58:00.318102 ignition[845]: Ignition finished successfully Feb 12 19:58:00.336484 ignition[851]: Ignition 2.14.0 Feb 12 19:58:00.336491 ignition[851]: Stage: fetch Feb 12 19:58:00.336604 ignition[851]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:00.336629 ignition[851]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:00.341755 ignition[851]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:00.342082 ignition[851]: parsed url from cmdline: "" Feb 12 19:58:00.342086 ignition[851]: no config URL provided Feb 12 19:58:00.342094 ignition[851]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:58:00.342103 ignition[851]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:58:00.342135 ignition[851]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:58:00.379494 ignition[851]: GET result: OK Feb 12 19:58:00.379527 ignition[851]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 12 19:58:00.457753 ignition[851]: opening config device: "/dev/sr0" Feb 12 19:58:00.458104 ignition[851]: getting drive status for "/dev/sr0" Feb 12 19:58:00.458152 ignition[851]: drive status: OK Feb 12 19:58:00.458192 ignition[851]: mounting config device Feb 12 19:58:00.458233 ignition[851]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure2438573038" Feb 12 19:58:00.483403 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/13 00:00 (1000) Feb 12 19:58:00.483058 systemd[1]: tmp-ignition\x2dazure2438573038.mount: Deactivated successfully. Feb 12 19:58:00.481572 ignition[851]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure2438573038" Feb 12 19:58:00.481579 ignition[851]: checking for config drive Feb 12 19:58:00.481851 ignition[851]: reading config Feb 12 19:58:00.482278 ignition[851]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure2438573038" Feb 12 19:58:00.482368 ignition[851]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure2438573038" Feb 12 19:58:00.482383 ignition[851]: config has been read from custom data Feb 12 19:58:00.482453 ignition[851]: parsing config with SHA512: 4314bcb2a3387652896b3c9717d36614453ac9993622c0eed5dc7bd44fb06d28c1795ffb4cdea66e375516394b6d8d421e99211964e0fe45171d2249faa034ae Feb 12 19:58:00.527906 unknown[851]: fetched base config from "system" Feb 12 19:58:00.527921 unknown[851]: fetched base config from "system" Feb 12 19:58:00.527930 unknown[851]: fetched user config from "azure" Feb 12 19:58:00.534214 ignition[851]: fetch: fetch complete Feb 12 19:58:00.534223 ignition[851]: fetch: fetch passed Feb 12 19:58:00.535842 ignition[851]: Ignition finished successfully Feb 12 19:58:00.539286 systemd[1]: Finished ignition-fetch.service. Feb 12 19:58:00.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.542337 systemd[1]: Starting ignition-kargs.service... Feb 12 19:58:00.559881 kernel: audit: type=1130 audit(1707767880.541:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.565952 ignition[858]: Ignition 2.14.0 Feb 12 19:58:00.565965 ignition[858]: Stage: kargs Feb 12 19:58:00.566100 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:00.566131 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:00.573693 systemd[1]: Finished ignition-kargs.service. Feb 12 19:58:00.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.570205 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:00.593887 kernel: audit: type=1130 audit(1707767880.575:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.576718 systemd[1]: Starting ignition-disks.service... Feb 12 19:58:00.572056 ignition[858]: kargs: kargs passed Feb 12 19:58:00.572484 ignition[858]: Ignition finished successfully Feb 12 19:58:00.597296 ignition[864]: Ignition 2.14.0 Feb 12 19:58:00.597302 ignition[864]: Stage: disks Feb 12 19:58:00.597403 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:00.597422 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:00.605745 systemd[1]: Finished ignition-disks.service. Feb 12 19:58:00.626647 kernel: audit: type=1130 audit(1707767880.609:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.601189 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:00.614649 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:58:00.603987 ignition[864]: disks: disks passed Feb 12 19:58:00.626634 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:58:00.604040 ignition[864]: Ignition finished successfully Feb 12 19:58:00.631673 systemd[1]: Reached target local-fs.target. Feb 12 19:58:00.633887 systemd[1]: Reached target sysinit.target. Feb 12 19:58:00.634815 systemd[1]: Reached target basic.target. Feb 12 19:58:00.636271 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:58:00.706023 systemd-fsck[872]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 12 19:58:00.711678 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:58:00.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.717776 systemd[1]: Mounting sysroot.mount... Feb 12 19:58:00.731259 kernel: audit: type=1130 audit(1707767880.716:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:00.743524 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:58:00.744370 systemd[1]: Mounted sysroot.mount. Feb 12 19:58:00.748192 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:58:00.779964 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:58:00.786980 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:58:00.792172 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:58:00.793259 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:58:00.803063 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:58:00.868394 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:58:00.875099 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:58:00.887522 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (882) Feb 12 19:58:00.898769 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:58:00.898895 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:58:00.898907 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:58:00.899055 initrd-setup-root[887]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:58:00.909817 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:58:00.954251 initrd-setup-root[913]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:58:00.960543 initrd-setup-root[921]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:58:00.965751 initrd-setup-root[929]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:58:01.398806 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:58:01.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.417810 kernel: audit: type=1130 audit(1707767881.402:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.418007 systemd[1]: Starting ignition-mount.service... Feb 12 19:58:01.424038 systemd[1]: Starting sysroot-boot.service... Feb 12 19:58:01.482681 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:58:01.482824 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:58:01.489941 ignition[949]: INFO : Ignition 2.14.0 Feb 12 19:58:01.492331 ignition[949]: INFO : Stage: mount Feb 12 19:58:01.494214 ignition[949]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:01.494214 ignition[949]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:01.521348 kernel: audit: type=1130 audit(1707767881.501:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.499183 systemd[1]: Finished sysroot-boot.service. Feb 12 19:58:01.526543 ignition[949]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:01.526543 ignition[949]: INFO : mount: mount passed Feb 12 19:58:01.526543 ignition[949]: INFO : Ignition finished successfully Feb 12 19:58:01.544668 kernel: audit: type=1130 audit(1707767881.526:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:01.521942 systemd[1]: Finished ignition-mount.service. Feb 12 19:58:02.060346 coreos-metadata[881]: Feb 12 19:58:02.060 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:58:02.074604 coreos-metadata[881]: Feb 12 19:58:02.074 INFO Fetch successful Feb 12 19:58:02.109043 coreos-metadata[881]: Feb 12 19:58:02.108 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:58:02.126545 coreos-metadata[881]: Feb 12 19:58:02.126 INFO Fetch successful Feb 12 19:58:02.141106 coreos-metadata[881]: Feb 12 19:58:02.140 INFO wrote hostname ci-3510.3.2-a-996941d352 to /sysroot/etc/hostname Feb 12 19:58:02.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:02.142923 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:58:02.166241 kernel: audit: type=1130 audit(1707767882.147:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:02.149019 systemd[1]: Starting ignition-files.service... Feb 12 19:58:02.169660 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:58:02.183522 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (961) Feb 12 19:58:02.192471 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:58:02.192533 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:58:02.192547 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:58:02.201092 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:58:02.215480 ignition[980]: INFO : Ignition 2.14.0 Feb 12 19:58:02.215480 ignition[980]: INFO : Stage: files Feb 12 19:58:02.220403 ignition[980]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:02.220403 ignition[980]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:02.220403 ignition[980]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:02.241122 ignition[980]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:58:02.253157 ignition[980]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:58:02.253157 ignition[980]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:58:02.279094 ignition[980]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:58:02.283315 ignition[980]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:58:02.283315 ignition[980]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:58:02.283060 unknown[980]: wrote ssh authorized keys file for user: core Feb 12 19:58:02.293866 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 19:58:02.293866 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:58:02.932042 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:58:03.062773 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 19:58:03.072375 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 19:58:03.072375 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:58:03.072375 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:58:03.163689 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:58:03.309141 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:58:03.309141 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 19:58:03.321967 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 19:58:03.836185 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:58:03.979676 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 19:58:03.988701 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 19:58:03.988701 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:58:03.988701 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:58:04.188965 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:58:04.517936 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 19:58:04.528028 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:58:04.528028 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:58:04.528028 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:58:04.652535 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:58:04.914125 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 19:58:04.922221 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:58:04.922221 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:58:04.922221 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:58:05.045716 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:58:05.762998 ignition[980]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 19:58:05.778451 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (982) Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:58:05.778492 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760848483" Feb 12 19:58:05.842758 kernel: audit: type=1130 audit(1707767885.814:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.788199 systemd[1]: mnt-oem2760848483.mount: Deactivated successfully. Feb 12 19:58:05.843207 ignition[980]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760848483": device or resource busy Feb 12 19:58:05.843207 ignition[980]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2760848483", trying btrfs: device or resource busy Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760848483" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760848483" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2760848483" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2760848483" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem264475235" Feb 12 19:58:05.843207 ignition[980]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem264475235": device or resource busy Feb 12 19:58:05.843207 ignition[980]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem264475235", trying btrfs: device or resource busy Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem264475235" Feb 12 19:58:05.843207 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem264475235" Feb 12 19:58:05.806472 systemd[1]: mnt-oem264475235.mount: Deactivated successfully. Feb 12 19:58:05.948774 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem264475235" Feb 12 19:58:05.948774 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem264475235" Feb 12 19:58:05.948774 ignition[980]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:58:05.948774 ignition[980]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 12 19:58:06.127469 kernel: audit: type=1130 audit(1707767885.965:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.127529 kernel: audit: type=1131 audit(1707767885.965:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.127549 kernel: audit: type=1130 audit(1707767886.003:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.127570 kernel: audit: type=1130 audit(1707767886.082:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.127588 kernel: audit: type=1131 audit(1707767886.082:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.809050 systemd[1]: Finished ignition-files.service. Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(21): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(22): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:58:06.129806 ignition[980]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:58:06.129806 ignition[980]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:58:06.129806 ignition[980]: INFO : files: files passed Feb 12 19:58:06.129806 ignition[980]: INFO : Ignition finished successfully Feb 12 19:58:06.206265 kernel: audit: type=1130 audit(1707767886.187:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.206367 initrd-setup-root-after-ignition[1005]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:58:05.831226 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:58:05.847888 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:58:06.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.918288 systemd[1]: Starting ignition-quench.service... Feb 12 19:58:06.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.963208 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:58:06.252162 kernel: audit: type=1130 audit(1707767886.222:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.252202 kernel: audit: type=1131 audit(1707767886.222:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:05.963327 systemd[1]: Finished ignition-quench.service. Feb 12 19:58:05.985827 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:58:06.004165 systemd[1]: Reached target ignition-complete.target. Feb 12 19:58:06.051531 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:58:06.077190 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:58:06.077291 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:58:06.096654 systemd[1]: Reached target initrd-fs.target. Feb 12 19:58:06.117048 systemd[1]: Reached target initrd.target. Feb 12 19:58:06.127472 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:58:06.162916 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:58:06.280721 kernel: audit: type=1131 audit(1707767886.260:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.177501 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:58:06.201300 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:58:06.220217 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:58:06.220316 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:58:06.223960 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:58:06.252173 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:58:06.254683 systemd[1]: Stopped target timers.target. Feb 12 19:58:06.256744 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:58:06.256810 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:58:06.260985 systemd[1]: Stopped target initrd.target. Feb 12 19:58:06.312627 systemd[1]: Stopped target basic.target. Feb 12 19:58:06.316625 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:58:06.321038 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:58:06.325301 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:58:06.327767 systemd[1]: Stopped target remote-fs.target. Feb 12 19:58:06.329955 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:58:06.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.332227 systemd[1]: Stopped target sysinit.target. Feb 12 19:58:06.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.336525 systemd[1]: Stopped target local-fs.target. Feb 12 19:58:06.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.338497 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:58:06.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.342352 systemd[1]: Stopped target swap.target. Feb 12 19:58:06.344312 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:58:06.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.344391 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:58:06.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.391201 ignition[1018]: INFO : Ignition 2.14.0 Feb 12 19:58:06.391201 ignition[1018]: INFO : Stage: umount Feb 12 19:58:06.391201 ignition[1018]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:58:06.391201 ignition[1018]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:58:06.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.348686 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:58:06.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.413759 ignition[1018]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:58:06.413759 ignition[1018]: INFO : umount: umount passed Feb 12 19:58:06.413759 ignition[1018]: INFO : Ignition finished successfully Feb 12 19:58:06.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.350715 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:58:06.350761 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:58:06.354642 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:58:06.354686 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:58:06.359243 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:58:06.359292 systemd[1]: Stopped ignition-files.service. Feb 12 19:58:06.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.361466 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:58:06.361524 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:58:06.367246 systemd[1]: Stopping ignition-mount.service... Feb 12 19:58:06.370301 systemd[1]: Stopping iscsiuio.service... Feb 12 19:58:06.372199 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:58:06.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.372280 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:58:06.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.375691 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:58:06.377980 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:58:06.378054 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:58:06.483000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:58:06.380571 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:58:06.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.380624 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:58:06.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.386307 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:58:06.386423 systemd[1]: Stopped iscsiuio.service. Feb 12 19:58:06.396395 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:58:06.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.396480 systemd[1]: Stopped ignition-mount.service. Feb 12 19:58:06.401077 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:58:06.401120 systemd[1]: Stopped ignition-disks.service. Feb 12 19:58:06.409471 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:58:06.409581 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:58:06.413723 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:58:06.413772 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:58:06.419027 systemd[1]: Stopped target network.target. Feb 12 19:58:06.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:06.423174 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:58:06.423230 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:58:06.428042 systemd[1]: Stopped target paths.target. Feb 12 19:58:06.429940 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:58:06.433545 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:58:06.437061 systemd[1]: Stopped target slices.target. Feb 12 19:58:06.439082 systemd[1]: Stopped target sockets.target. Feb 12 19:58:06.444195 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:58:06.444234 systemd[1]: Closed iscsid.socket. Feb 12 19:58:06.448331 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:58:06.448377 systemd[1]: Closed iscsiuio.socket. Feb 12 19:58:06.452558 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:58:06.452610 systemd[1]: Stopped ignition-setup.service. Feb 12 19:58:06.456877 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:58:06.461635 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:58:06.466589 systemd-networkd[821]: eth0: DHCPv6 lease lost Feb 12 19:58:06.579000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:58:06.469081 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:58:06.469180 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:58:06.474757 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:58:06.474848 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:58:06.481059 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:58:06.481100 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:58:06.486248 systemd[1]: Stopping network-cleanup.service... Feb 12 19:58:06.489723 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:58:06.489775 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:58:06.494443 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:58:06.494500 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:58:06.496706 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:58:06.496748 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:58:06.501176 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:58:06.508617 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:58:06.509121 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:58:06.509246 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:58:06.514769 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:58:06.514829 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:58:06.524464 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:58:06.526393 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:58:06.531157 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:58:06.533062 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:58:06.534058 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:58:06.534098 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:58:06.534455 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:58:06.534486 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:58:06.536236 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:58:06.536379 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:58:06.536425 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:58:06.543644 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:58:06.543742 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:58:07.000042 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:58:07.007958 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:58:07.008069 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:58:07.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:07.013773 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:58:07.013838 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:58:07.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:08.042535 kernel: hv_netvsc 002248a1-8bc6-0022-48a1-8bc6002248a1 eth0: Data path switched from VF: enP25258s1 Feb 12 19:58:08.060051 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:58:08.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:08.060196 systemd[1]: Stopped network-cleanup.service. Feb 12 19:58:08.067332 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:58:08.073047 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:58:08.084451 systemd[1]: Switching root. Feb 12 19:58:08.112404 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 12 19:58:08.112498 iscsid[830]: iscsid shutting down. Feb 12 19:58:08.114719 systemd-journald[183]: Journal stopped Feb 12 19:58:20.761642 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:58:20.761679 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:58:20.761691 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:58:20.761702 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:58:20.761710 kernel: SELinux: policy capability open_perms=1 Feb 12 19:58:20.761719 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:58:20.761730 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:58:20.761740 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:58:20.761751 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:58:20.761760 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:58:20.761771 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:58:20.761782 systemd[1]: Successfully loaded SELinux policy in 287.462ms. Feb 12 19:58:20.761794 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.748ms. Feb 12 19:58:20.761807 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:58:20.761823 systemd[1]: Detected virtualization microsoft. Feb 12 19:58:20.761834 systemd[1]: Detected architecture x86-64. Feb 12 19:58:20.761844 systemd[1]: Detected first boot. Feb 12 19:58:20.761857 systemd[1]: Hostname set to . Feb 12 19:58:20.761868 systemd[1]: Initializing machine ID from random generator. Feb 12 19:58:20.761885 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:58:20.761899 kernel: audit: type=1400 audit(1707767890.823:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:58:20.761913 kernel: audit: type=1400 audit(1707767890.823:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:58:20.761938 kernel: audit: type=1334 audit(1707767890.827:84): prog-id=10 op=LOAD Feb 12 19:58:20.761952 kernel: audit: type=1334 audit(1707767890.827:85): prog-id=10 op=UNLOAD Feb 12 19:58:20.761965 kernel: audit: type=1334 audit(1707767890.841:86): prog-id=11 op=LOAD Feb 12 19:58:20.761982 kernel: audit: type=1334 audit(1707767890.841:87): prog-id=11 op=UNLOAD Feb 12 19:58:20.761996 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:58:20.762012 kernel: audit: type=1400 audit(1707767891.953:88): avc: denied { associate } for pid=1051 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:58:20.762028 kernel: audit: type=1300 audit(1707767891.953:88): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae58 a2=c000029b00 a3=32 items=0 ppid=1034 pid=1051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:20.762043 kernel: audit: type=1327 audit(1707767891.953:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:58:20.762058 kernel: audit: type=1400 audit(1707767891.961:89): avc: denied { associate } for pid=1051 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:58:20.762072 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:58:20.762091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:58:20.762107 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:58:20.762125 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:58:20.762139 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 12 19:58:20.762153 kernel: audit: type=1334 audit(1707767900.220:90): prog-id=12 op=LOAD Feb 12 19:58:20.762167 kernel: audit: type=1334 audit(1707767900.220:91): prog-id=3 op=UNLOAD Feb 12 19:58:20.762179 kernel: audit: type=1334 audit(1707767900.225:92): prog-id=13 op=LOAD Feb 12 19:58:20.762195 kernel: audit: type=1334 audit(1707767900.230:93): prog-id=14 op=LOAD Feb 12 19:58:20.762210 kernel: audit: type=1334 audit(1707767900.230:94): prog-id=4 op=UNLOAD Feb 12 19:58:20.762244 kernel: audit: type=1334 audit(1707767900.230:95): prog-id=5 op=UNLOAD Feb 12 19:58:20.762256 kernel: audit: type=1334 audit(1707767900.235:96): prog-id=15 op=LOAD Feb 12 19:58:20.762266 kernel: audit: type=1334 audit(1707767900.235:97): prog-id=12 op=UNLOAD Feb 12 19:58:20.762277 kernel: audit: type=1334 audit(1707767900.255:98): prog-id=16 op=LOAD Feb 12 19:58:20.762288 kernel: audit: type=1334 audit(1707767900.260:99): prog-id=17 op=LOAD Feb 12 19:58:20.762299 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:58:20.762308 systemd[1]: Stopped iscsid.service. Feb 12 19:58:20.762324 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:58:20.762336 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:58:20.762346 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:58:20.762359 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:58:20.762370 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:58:20.762381 systemd[1]: Created slice system-getty.slice. Feb 12 19:58:20.762391 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:58:20.762402 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:58:20.762417 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:58:20.762427 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:58:20.762439 systemd[1]: Created slice user.slice. Feb 12 19:58:20.762449 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:58:20.762460 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:58:20.762470 systemd[1]: Set up automount boot.automount. Feb 12 19:58:20.762484 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:58:20.762496 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:58:20.762550 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:58:20.762566 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:58:20.762579 systemd[1]: Reached target integritysetup.target. Feb 12 19:58:20.762589 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:58:20.762599 systemd[1]: Reached target remote-fs.target. Feb 12 19:58:20.762611 systemd[1]: Reached target slices.target. Feb 12 19:58:20.762623 systemd[1]: Reached target swap.target. Feb 12 19:58:20.762633 systemd[1]: Reached target torcx.target. Feb 12 19:58:20.762647 systemd[1]: Reached target veritysetup.target. Feb 12 19:58:20.762657 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:58:20.762669 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:58:20.762679 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:58:20.762691 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:58:20.762706 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:58:20.762716 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:58:20.762728 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:58:20.762739 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:58:20.762751 systemd[1]: Mounting media.mount... Feb 12 19:58:20.762760 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:58:20.762774 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:58:20.762786 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:58:20.762796 systemd[1]: Mounting tmp.mount... Feb 12 19:58:20.762811 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:58:20.762822 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:58:20.762834 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:58:20.762843 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:58:20.762856 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:58:20.762868 systemd[1]: Starting modprobe@drm.service... Feb 12 19:58:20.762878 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:58:20.762889 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:58:20.762900 systemd[1]: Starting modprobe@loop.service... Feb 12 19:58:20.762915 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:58:20.762925 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:58:20.762938 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:58:20.762949 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:58:20.762961 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:58:20.762972 systemd[1]: Stopped systemd-journald.service. Feb 12 19:58:20.762983 systemd[1]: Starting systemd-journald.service... Feb 12 19:58:20.762996 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:58:20.763006 kernel: loop: module loaded Feb 12 19:58:20.763020 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:58:20.763031 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:58:20.763042 kernel: fuse: init (API version 7.34) Feb 12 19:58:20.763051 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:58:20.763064 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:58:20.763076 systemd[1]: Stopped verity-setup.service. Feb 12 19:58:20.763086 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:58:20.763097 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:58:20.763108 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:58:20.763122 systemd[1]: Mounted media.mount. Feb 12 19:58:20.763132 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:58:20.763145 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:58:20.763156 systemd[1]: Mounted tmp.mount. Feb 12 19:58:20.763167 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:58:20.763184 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:58:20.763206 systemd-journald[1136]: Journal started Feb 12 19:58:20.763261 systemd-journald[1136]: Runtime Journal (/run/log/journal/ff22e783173e41d6af2072b869e61c24) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:58:10.227000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:58:10.806000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:58:10.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:58:10.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:58:10.827000 audit: BPF prog-id=10 op=LOAD Feb 12 19:58:10.827000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:58:10.841000 audit: BPF prog-id=11 op=LOAD Feb 12 19:58:10.841000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:58:11.953000 audit[1051]: AVC avc: denied { associate } for pid=1051 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:58:11.953000 audit[1051]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae58 a2=c000029b00 a3=32 items=0 ppid=1034 pid=1051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:11.953000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:58:11.961000 audit[1051]: AVC avc: denied { associate } for pid=1051 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:58:11.961000 audit[1051]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a5 a2=1ed a3=0 items=2 ppid=1034 pid=1051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:11.961000 audit: CWD cwd="/" Feb 12 19:58:11.961000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:11.961000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:11.961000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:58:20.220000 audit: BPF prog-id=12 op=LOAD Feb 12 19:58:20.220000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:58:20.225000 audit: BPF prog-id=13 op=LOAD Feb 12 19:58:20.230000 audit: BPF prog-id=14 op=LOAD Feb 12 19:58:20.230000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:58:20.230000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:58:20.235000 audit: BPF prog-id=15 op=LOAD Feb 12 19:58:20.235000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:58:20.255000 audit: BPF prog-id=16 op=LOAD Feb 12 19:58:20.260000 audit: BPF prog-id=17 op=LOAD Feb 12 19:58:20.260000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:58:20.260000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:58:20.265000 audit: BPF prog-id=18 op=LOAD Feb 12 19:58:20.265000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:58:20.271000 audit: BPF prog-id=19 op=LOAD Feb 12 19:58:20.277000 audit: BPF prog-id=20 op=LOAD Feb 12 19:58:20.277000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:58:20.277000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:58:20.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.288000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:58:20.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.638000 audit: BPF prog-id=21 op=LOAD Feb 12 19:58:20.639000 audit: BPF prog-id=22 op=LOAD Feb 12 19:58:20.639000 audit: BPF prog-id=23 op=LOAD Feb 12 19:58:20.639000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:58:20.639000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:58:20.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.755000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:58:20.755000 audit[1136]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd55702030 a2=4000 a3=7ffd557020cc items=0 ppid=1 pid=1136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:20.755000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:58:20.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:11.940091 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:58:20.219645 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:58:11.940682 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:58:20.277944 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:58:11.940705 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:58:11.940744 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:58:11.940755 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:58:11.940798 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:58:11.940812 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:58:11.941020 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:58:11.941074 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:58:11.941090 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:58:11.941643 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:58:11.941682 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:58:11.941703 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:58:11.941719 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:58:11.941738 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:58:11.941753 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:58:19.099825 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:58:19.100064 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:58:19.100205 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:58:19.100371 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:58:19.100417 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:58:19.100469 /usr/lib/systemd/system-generators/torcx-generator[1051]: time="2024-02-12T19:58:19Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:58:20.772589 systemd[1]: Started systemd-journald.service. Feb 12 19:58:20.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.777379 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:58:20.777548 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:58:20.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.779947 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:58:20.780088 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:58:20.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.782323 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:58:20.782451 systemd[1]: Finished modprobe@drm.service. Feb 12 19:58:20.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.784661 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:58:20.784795 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:58:20.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.786972 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:58:20.787112 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:58:20.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.789212 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:58:20.789345 systemd[1]: Finished modprobe@loop.service. Feb 12 19:58:20.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.791496 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:58:20.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.793836 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:58:20.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.796376 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:58:20.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.799040 systemd[1]: Reached target network-pre.target. Feb 12 19:58:20.802866 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:58:20.806496 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:58:20.808819 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:58:20.810252 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:58:20.813490 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:58:20.816350 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:58:20.817874 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:58:20.820708 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:58:20.822244 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:58:20.828981 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:58:20.837006 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:58:20.839715 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:58:20.852600 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:58:20.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.855060 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:58:20.857682 systemd-journald[1136]: Time spent on flushing to /var/log/journal/ff22e783173e41d6af2072b869e61c24 is 18.327ms for 1216 entries. Feb 12 19:58:20.857682 systemd-journald[1136]: System Journal (/var/log/journal/ff22e783173e41d6af2072b869e61c24) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:58:20.970782 systemd-journald[1136]: Received client request to flush runtime journal. Feb 12 19:58:20.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:20.886194 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:58:20.890010 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:58:20.975815 udevadm[1175]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:58:20.919644 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:58:20.971946 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:58:21.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:21.440641 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:58:22.029025 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:58:22.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:22.032000 audit: BPF prog-id=24 op=LOAD Feb 12 19:58:22.032000 audit: BPF prog-id=25 op=LOAD Feb 12 19:58:22.032000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:58:22.032000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:58:22.033462 systemd[1]: Starting systemd-udevd.service... Feb 12 19:58:22.051906 systemd-udevd[1177]: Using default interface naming scheme 'v252'. Feb 12 19:58:22.238325 systemd[1]: Started systemd-udevd.service. Feb 12 19:58:22.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:22.242000 audit: BPF prog-id=26 op=LOAD Feb 12 19:58:22.246856 systemd[1]: Starting systemd-networkd.service... Feb 12 19:58:22.281534 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:58:22.340000 audit: BPF prog-id=27 op=LOAD Feb 12 19:58:22.340000 audit: BPF prog-id=28 op=LOAD Feb 12 19:58:22.340000 audit: BPF prog-id=29 op=LOAD Feb 12 19:58:22.342174 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:58:22.366648 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:58:22.430000 audit[1203]: AVC avc: denied { confidentiality } for pid=1203 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:58:22.438527 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:58:22.438731 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:58:22.430000 audit[1203]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c71750d680 a1=f884 a2=7f1fb2b0cbc5 a3=5 items=12 ppid=1177 pid=1203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:22.430000 audit: CWD cwd="/" Feb 12 19:58:22.430000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=1 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=2 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=3 name=(null) inode=15754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=4 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=5 name=(null) inode=15755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=6 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=7 name=(null) inode=15756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=8 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=9 name=(null) inode=15757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=10 name=(null) inode=15753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PATH item=11 name=(null) inode=15758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:58:22.430000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:58:23.028694 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:58:23.029010 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:58:23.032309 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:58:23.032400 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:58:23.038545 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:58:23.884793 systemd[1]: Started systemd-userdbd.service. Feb 12 19:58:23.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:23.895249 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:58:23.902607 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:58:23.902686 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:58:23.909927 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:58:23.913245 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:58:24.098253 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1203) Feb 12 19:58:24.128324 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:58:24.134116 systemd-networkd[1184]: lo: Link UP Feb 12 19:58:24.134490 systemd-networkd[1184]: lo: Gained carrier Feb 12 19:58:24.135273 systemd-networkd[1184]: Enumeration completed Feb 12 19:58:24.137622 systemd[1]: Started systemd-networkd.service. Feb 12 19:58:24.141799 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:58:24.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:24.156535 systemd-networkd[1184]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:58:24.168245 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 12 19:58:24.216249 kernel: mlx5_core 62aa:00:02.0 enP25258s1: Link up Feb 12 19:58:24.754267 kernel: hv_netvsc 002248a1-8bc6-0022-48a1-8bc6002248a1 eth0: Data path switched to VF: enP25258s1 Feb 12 19:58:24.754384 systemd-networkd[1184]: enP25258s1: Link UP Feb 12 19:58:24.754562 systemd-networkd[1184]: eth0: Link UP Feb 12 19:58:24.754569 systemd-networkd[1184]: eth0: Gained carrier Feb 12 19:58:24.759638 systemd-networkd[1184]: enP25258s1: Gained carrier Feb 12 19:58:24.776659 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:58:24.780475 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:58:24.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:24.785403 systemd-networkd[1184]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:58:25.177102 lvm[1254]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:58:25.201307 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:58:25.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:25.204733 systemd[1]: Reached target cryptsetup.target. Feb 12 19:58:25.208504 systemd[1]: Starting lvm2-activation.service... Feb 12 19:58:25.214696 lvm[1255]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:58:25.238338 systemd[1]: Finished lvm2-activation.service. Feb 12 19:58:25.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:25.241337 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:58:25.243736 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:58:25.243776 systemd[1]: Reached target local-fs.target. Feb 12 19:58:25.245980 systemd[1]: Reached target machines.target. Feb 12 19:58:25.249556 systemd[1]: Starting ldconfig.service... Feb 12 19:58:25.267994 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:58:25.268075 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:58:25.269373 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:58:25.272870 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:58:25.277166 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:58:25.280092 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:58:25.280189 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:58:25.281285 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:58:25.305134 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1257 (bootctl) Feb 12 19:58:25.306559 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:58:25.333619 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:58:25.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:25.861536 systemd-networkd[1184]: eth0: Gained IPv6LL Feb 12 19:58:25.867061 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:58:25.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:25.940660 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:58:25.984101 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:58:25.984796 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:58:25.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:25.989963 kernel: kauditd_printk_skb: 82 callbacks suppressed Feb 12 19:58:25.990028 kernel: audit: type=1130 audit(1707767905.986:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:26.039329 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:58:26.157067 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:58:26.582973 systemd-fsck[1265]: fsck.fat 4.2 (2021-01-31) Feb 12 19:58:26.582973 systemd-fsck[1265]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 19:58:26.585513 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:58:26.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:26.597394 systemd[1]: Mounting boot.mount... Feb 12 19:58:26.606724 kernel: audit: type=1130 audit(1707767906.588:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:26.612833 systemd[1]: Mounted boot.mount. Feb 12 19:58:26.628932 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:58:26.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:26.643371 kernel: audit: type=1130 audit(1707767906.630:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.305635 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:58:27.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.309599 systemd[1]: Starting audit-rules.service... Feb 12 19:58:27.320861 kernel: audit: type=1130 audit(1707767907.307:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.322390 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:58:27.326850 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:58:27.329000 audit: BPF prog-id=30 op=LOAD Feb 12 19:58:27.337816 kernel: audit: type=1334 audit(1707767907.329:169): prog-id=30 op=LOAD Feb 12 19:58:27.334058 systemd[1]: Starting systemd-resolved.service... Feb 12 19:58:27.347809 kernel: audit: type=1334 audit(1707767907.337:170): prog-id=31 op=LOAD Feb 12 19:58:27.337000 audit: BPF prog-id=31 op=LOAD Feb 12 19:58:27.340094 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:58:27.345809 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:58:27.365000 audit[1279]: SYSTEM_BOOT pid=1279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.368408 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:58:27.381301 kernel: audit: type=1127 audit(1707767907.365:171): pid=1279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.395486 kernel: audit: type=1130 audit(1707767907.380:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.422525 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:58:27.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.425374 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:58:27.440654 kernel: audit: type=1130 audit(1707767907.424:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.460194 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:58:27.478479 kernel: audit: type=1130 audit(1707767907.462:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.498475 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:58:27.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.501302 systemd[1]: Reached target time-set.target. Feb 12 19:58:27.522598 systemd-resolved[1275]: Positive Trust Anchors: Feb 12 19:58:27.522618 systemd-resolved[1275]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:58:27.522654 systemd-resolved[1275]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:58:27.596714 systemd-resolved[1275]: Using system hostname 'ci-3510.3.2-a-996941d352'. Feb 12 19:58:27.598365 systemd[1]: Started systemd-resolved.service. Feb 12 19:58:27.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:58:27.601024 systemd[1]: Reached target network.target. Feb 12 19:58:27.603399 systemd[1]: Reached target network-online.target. Feb 12 19:58:27.606287 systemd[1]: Reached target nss-lookup.target. Feb 12 19:58:27.725000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:58:27.725000 audit[1292]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd57310ac0 a2=420 a3=0 items=0 ppid=1271 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:58:27.725000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:58:27.727186 augenrules[1292]: No rules Feb 12 19:58:27.728177 systemd[1]: Finished audit-rules.service. Feb 12 19:58:31.802977 ldconfig[1256]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:58:31.812181 systemd[1]: Finished ldconfig.service. Feb 12 19:58:31.816820 systemd[1]: Starting systemd-update-done.service... Feb 12 19:58:31.835682 systemd[1]: Finished systemd-update-done.service. Feb 12 19:58:31.838681 systemd[1]: Reached target sysinit.target. Feb 12 19:58:31.841083 systemd[1]: Started motdgen.path. Feb 12 19:58:31.843171 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:58:31.846309 systemd[1]: Started logrotate.timer. Feb 12 19:58:31.848327 systemd[1]: Started mdadm.timer. Feb 12 19:58:31.850874 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:58:31.853712 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:58:31.853758 systemd[1]: Reached target paths.target. Feb 12 19:58:31.855849 systemd[1]: Reached target timers.target. Feb 12 19:58:31.858580 systemd[1]: Listening on dbus.socket. Feb 12 19:58:31.861553 systemd[1]: Starting docker.socket... Feb 12 19:58:31.879743 systemd[1]: Listening on sshd.socket. Feb 12 19:58:31.882416 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:58:31.882931 systemd[1]: Listening on docker.socket. Feb 12 19:58:31.885324 systemd[1]: Reached target sockets.target. Feb 12 19:58:31.887684 systemd[1]: Reached target basic.target. Feb 12 19:58:31.890358 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:58:31.890391 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:58:31.891567 systemd[1]: Starting containerd.service... Feb 12 19:58:31.894590 systemd[1]: Starting dbus.service... Feb 12 19:58:31.897653 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:58:31.900869 systemd[1]: Starting extend-filesystems.service... Feb 12 19:58:31.902837 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:58:31.904132 systemd[1]: Starting motdgen.service... Feb 12 19:58:31.907546 systemd[1]: Started nvidia.service. Feb 12 19:58:31.912020 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:58:31.915397 systemd[1]: Starting prepare-critools.service... Feb 12 19:58:31.919353 systemd[1]: Starting prepare-helm.service... Feb 12 19:58:31.922553 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:58:31.926306 systemd[1]: Starting sshd-keygen.service... Feb 12 19:58:31.931496 systemd[1]: Starting systemd-logind.service... Feb 12 19:58:31.937066 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:58:31.937163 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:58:31.937729 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:58:31.938565 systemd[1]: Starting update-engine.service... Feb 12 19:58:31.943821 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:58:31.957634 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:58:31.957878 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:58:31.967429 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:58:31.967632 systemd[1]: Finished motdgen.service. Feb 12 19:58:31.972220 extend-filesystems[1303]: Found sda Feb 12 19:58:31.976170 extend-filesystems[1303]: Found sda1 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda2 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda3 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found usr Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda4 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda6 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda7 Feb 12 19:58:31.980622 extend-filesystems[1303]: Found sda9 Feb 12 19:58:31.980622 extend-filesystems[1303]: Checking size of /dev/sda9 Feb 12 19:58:32.011697 jq[1321]: true Feb 12 19:58:32.011845 jq[1302]: false Feb 12 19:58:31.992677 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:58:32.012048 jq[1341]: true Feb 12 19:58:31.992880 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:58:32.052768 extend-filesystems[1303]: Old size kept for /dev/sda9 Feb 12 19:58:32.063415 env[1331]: time="2024-02-12T19:58:32.057827800Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:58:32.066787 extend-filesystems[1303]: Found sr0 Feb 12 19:58:32.068891 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:58:32.069122 systemd[1]: Finished extend-filesystems.service. Feb 12 19:58:32.084401 systemd-logind[1316]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:58:32.084905 systemd-logind[1316]: New seat seat0. Feb 12 19:58:32.144557 env[1331]: time="2024-02-12T19:58:32.144507100Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:58:32.144985 env[1331]: time="2024-02-12T19:58:32.144963400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.146450 env[1331]: time="2024-02-12T19:58:32.146408400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:58:32.146578 env[1331]: time="2024-02-12T19:58:32.146561300Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.146892 env[1331]: time="2024-02-12T19:58:32.146868600Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:58:32.146977 env[1331]: time="2024-02-12T19:58:32.146963100Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.147045 env[1331]: time="2024-02-12T19:58:32.147030400Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:58:32.147112 env[1331]: time="2024-02-12T19:58:32.147098800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.147269 env[1331]: time="2024-02-12T19:58:32.147252700Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.147580 env[1331]: time="2024-02-12T19:58:32.147561300Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:58:32.147822 env[1331]: time="2024-02-12T19:58:32.147800000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:58:32.147895 env[1331]: time="2024-02-12T19:58:32.147881300Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:58:32.148003 env[1331]: time="2024-02-12T19:58:32.147987600Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:58:32.148074 env[1331]: time="2024-02-12T19:58:32.148061600Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:58:32.190055 bash[1357]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:58:32.190561 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:58:32.194976 env[1331]: time="2024-02-12T19:58:32.194925900Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:58:32.195082 env[1331]: time="2024-02-12T19:58:32.194986800Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:58:32.195082 env[1331]: time="2024-02-12T19:58:32.195004300Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:58:32.195082 env[1331]: time="2024-02-12T19:58:32.195047200Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195082 env[1331]: time="2024-02-12T19:58:32.195066900Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195083900Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195101900Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195122500Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195141000Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195161400Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195179000Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195250 env[1331]: time="2024-02-12T19:58:32.195197200Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:58:32.195498 env[1331]: time="2024-02-12T19:58:32.195458300Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:58:32.195594 env[1331]: time="2024-02-12T19:58:32.195572500Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:58:32.195946 env[1331]: time="2024-02-12T19:58:32.195923900Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:58:32.195994 env[1331]: time="2024-02-12T19:58:32.195965800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.195994 env[1331]: time="2024-02-12T19:58:32.195986000Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:58:32.196071 env[1331]: time="2024-02-12T19:58:32.196049600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196107 env[1331]: time="2024-02-12T19:58:32.196076700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196107 env[1331]: time="2024-02-12T19:58:32.196099000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196183 env[1331]: time="2024-02-12T19:58:32.196116500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196183 env[1331]: time="2024-02-12T19:58:32.196134600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196183 env[1331]: time="2024-02-12T19:58:32.196161100Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196323 env[1331]: time="2024-02-12T19:58:32.196180000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196323 env[1331]: time="2024-02-12T19:58:32.196196700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196323 env[1331]: time="2024-02-12T19:58:32.196223300Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:58:32.196498 env[1331]: time="2024-02-12T19:58:32.196474900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196545 env[1331]: time="2024-02-12T19:58:32.196520800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196582 env[1331]: time="2024-02-12T19:58:32.196544900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196582 env[1331]: time="2024-02-12T19:58:32.196563600Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:58:32.196653 env[1331]: time="2024-02-12T19:58:32.196587100Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:58:32.196653 env[1331]: time="2024-02-12T19:58:32.196603100Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:58:32.196653 env[1331]: time="2024-02-12T19:58:32.196626500Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:58:32.196753 env[1331]: time="2024-02-12T19:58:32.196668900Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:58:32.196996 env[1331]: time="2024-02-12T19:58:32.196928800Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.197015000Z" level=info msg="Connect containerd service" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.197059800Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.197791000Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.198087400Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.198132400Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.200758700Z" level=info msg="containerd successfully booted in 0.143772s" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201363800Z" level=info msg="Start subscribing containerd event" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201502900Z" level=info msg="Start recovering state" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201671300Z" level=info msg="Start event monitor" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201690800Z" level=info msg="Start snapshots syncer" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201791800Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:58:32.221490 env[1331]: time="2024-02-12T19:58:32.201802700Z" level=info msg="Start streaming server" Feb 12 19:58:32.221969 tar[1330]: linux-amd64/helm Feb 12 19:58:32.222219 tar[1325]: ./ Feb 12 19:58:32.222219 tar[1325]: ./macvlan Feb 12 19:58:32.198262 systemd[1]: Started containerd.service. Feb 12 19:58:32.225283 tar[1329]: crictl Feb 12 19:58:32.249357 dbus-daemon[1301]: [system] SELinux support is enabled Feb 12 19:58:32.249556 systemd[1]: Started dbus.service. Feb 12 19:58:32.254401 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:58:32.254438 systemd[1]: Reached target system-config.target. Feb 12 19:58:32.257593 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:58:32.257624 systemd[1]: Reached target user-config.target. Feb 12 19:58:32.264554 systemd[1]: Started systemd-logind.service. Feb 12 19:58:32.265827 dbus-daemon[1301]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:58:32.370309 tar[1325]: ./static Feb 12 19:58:32.372157 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:58:32.451772 tar[1325]: ./vlan Feb 12 19:58:32.533417 tar[1325]: ./portmap Feb 12 19:58:32.608671 tar[1325]: ./host-local Feb 12 19:58:32.679146 tar[1325]: ./vrf Feb 12 19:58:32.731756 update_engine[1319]: I0212 19:58:32.730887 1319 main.cc:92] Flatcar Update Engine starting Feb 12 19:58:32.749815 tar[1325]: ./bridge Feb 12 19:58:32.780222 systemd[1]: Started update-engine.service. Feb 12 19:58:32.782172 update_engine[1319]: I0212 19:58:32.782058 1319 update_check_scheduler.cc:74] Next update check in 4m12s Feb 12 19:58:32.785558 systemd[1]: Started locksmithd.service. Feb 12 19:58:32.851888 tar[1325]: ./tuning Feb 12 19:58:32.920861 tar[1325]: ./firewall Feb 12 19:58:33.007428 tar[1325]: ./host-device Feb 12 19:58:33.087090 tar[1325]: ./sbr Feb 12 19:58:33.157766 tar[1325]: ./loopback Feb 12 19:58:33.227248 tar[1325]: ./dhcp Feb 12 19:58:33.291913 tar[1330]: linux-amd64/LICENSE Feb 12 19:58:33.292308 tar[1330]: linux-amd64/README.md Feb 12 19:58:33.300438 systemd[1]: Finished prepare-helm.service. Feb 12 19:58:33.305596 systemd[1]: Finished prepare-critools.service. Feb 12 19:58:33.370133 tar[1325]: ./ptp Feb 12 19:58:33.412544 tar[1325]: ./ipvlan Feb 12 19:58:33.453683 tar[1325]: ./bandwidth Feb 12 19:58:33.531313 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:58:33.796920 sshd_keygen[1320]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:58:33.817524 systemd[1]: Finished sshd-keygen.service. Feb 12 19:58:33.821929 systemd[1]: Starting issuegen.service... Feb 12 19:58:33.826088 systemd[1]: Started waagent.service. Feb 12 19:58:33.830172 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:58:33.830392 systemd[1]: Finished issuegen.service. Feb 12 19:58:33.834378 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:58:33.854088 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:58:33.858315 systemd[1]: Started getty@tty1.service. Feb 12 19:58:33.862239 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:58:33.864911 systemd[1]: Reached target getty.target. Feb 12 19:58:33.886421 systemd[1]: Reached target multi-user.target. Feb 12 19:58:33.890542 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:58:33.898582 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:58:33.898768 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:58:33.901830 systemd[1]: Startup finished in 7.094s (firmware) + 22.450s (loader) + 924ms (kernel) + 16.043s (initrd) + 23.381s (userspace) = 1min 9.894s. Feb 12 19:58:34.354336 login[1435]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:58:34.356195 login[1436]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:58:34.377220 systemd[1]: Created slice user-500.slice. Feb 12 19:58:34.378696 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:58:34.386266 systemd-logind[1316]: New session 2 of user core. Feb 12 19:58:34.390732 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:58:34.394081 systemd[1]: Starting user@500.service... Feb 12 19:58:34.424343 (systemd)[1439]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:58:34.594077 systemd[1439]: Queued start job for default target default.target. Feb 12 19:58:34.594741 systemd[1439]: Reached target paths.target. Feb 12 19:58:34.594771 systemd[1439]: Reached target sockets.target. Feb 12 19:58:34.594789 systemd[1439]: Reached target timers.target. Feb 12 19:58:34.594805 systemd[1439]: Reached target basic.target. Feb 12 19:58:34.594865 systemd[1439]: Reached target default.target. Feb 12 19:58:34.594903 systemd[1439]: Startup finished in 164ms. Feb 12 19:58:34.594946 systemd[1]: Started user@500.service. Feb 12 19:58:34.596357 systemd[1]: Started session-2.scope. Feb 12 19:58:34.605063 locksmithd[1413]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:58:35.354735 login[1435]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:58:35.358918 systemd-logind[1316]: New session 1 of user core. Feb 12 19:58:35.360178 systemd[1]: Started session-1.scope. Feb 12 19:58:37.967034 systemd-timesyncd[1276]: Timed out waiting for reply from 162.159.200.1:123 (0.flatcar.pool.ntp.org). Feb 12 19:58:37.969508 systemd-timesyncd[1276]: Contacted time server 89.234.64.77:123 (0.flatcar.pool.ntp.org). Feb 12 19:58:37.969727 systemd-timesyncd[1276]: Initial clock synchronization to Mon 2024-02-12 19:58:37.978158 UTC. Feb 12 19:58:40.225701 waagent[1430]: 2024-02-12T19:58:40.225574Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:58:40.230281 waagent[1430]: 2024-02-12T19:58:40.230176Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:58:40.233201 waagent[1430]: 2024-02-12T19:58:40.233125Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:58:40.236004 waagent[1430]: 2024-02-12T19:58:40.235914Z INFO Daemon Daemon Run daemon Feb 12 19:58:40.239083 waagent[1430]: 2024-02-12T19:58:40.239011Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:58:40.252592 waagent[1430]: 2024-02-12T19:58:40.252457Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:58:40.260215 waagent[1430]: 2024-02-12T19:58:40.260075Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.260608Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.262015Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.263538Z INFO Daemon Daemon Activate resource disk Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.264394Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.272202Z INFO Daemon Daemon Found device: None Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.273134Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.274055Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.275870Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:58:40.292259 waagent[1430]: 2024-02-12T19:58:40.276942Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:58:40.295135 waagent[1430]: 2024-02-12T19:58:40.294987Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:58:40.304702 waagent[1430]: 2024-02-12T19:58:40.304558Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:58:40.314567 waagent[1430]: 2024-02-12T19:58:40.305076Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:58:40.314567 waagent[1430]: 2024-02-12T19:58:40.306296Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:58:40.327438 waagent[1430]: 2024-02-12T19:58:40.327253Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:58:40.442116 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:58:40.460409 waagent[1430]: 2024-02-12T19:58:40.460260Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:58:40.476611 waagent[1430]: 2024-02-12T19:58:40.460879Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:58:40.476611 waagent[1430]: 2024-02-12T19:58:40.462206Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:58:40.476611 waagent[1430]: 2024-02-12T19:58:40.463090Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:58:40.476611 waagent[1430]: 2024-02-12T19:58:40.464365Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:58:40.476611 waagent[1430]: 2024-02-12T19:58:40.465186Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:58:40.562177 waagent[1430]: 2024-02-12T19:58:40.562085Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:58:40.566675 waagent[1430]: 2024-02-12T19:58:40.566622Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:58:40.569952 waagent[1430]: 2024-02-12T19:58:40.569880Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:58:41.019898 waagent[1430]: 2024-02-12T19:58:41.019735Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:58:41.033116 waagent[1430]: 2024-02-12T19:58:41.033030Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:58:41.036834 waagent[1430]: 2024-02-12T19:58:41.036759Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:58:41.120257 waagent[1430]: 2024-02-12T19:58:41.120090Z INFO Daemon Daemon Found private key matching thumbprint 0B4C451E30C3945399444C7E6357621F033370A4 Feb 12 19:58:41.125678 waagent[1430]: 2024-02-12T19:58:41.125587Z INFO Daemon Daemon Certificate with thumbprint 815BA08EF257F2876FD0B9B80686FC2A3A868506 has no matching private key. Feb 12 19:58:41.130755 waagent[1430]: 2024-02-12T19:58:41.130671Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:58:41.209328 waagent[1430]: 2024-02-12T19:58:41.209202Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: c2dc48f9-048a-417c-bd96-dd642bf5e8a6 New eTag: 14552897879771565920] Feb 12 19:58:41.216716 waagent[1430]: 2024-02-12T19:58:41.216616Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:58:41.230557 waagent[1430]: 2024-02-12T19:58:41.230483Z INFO Daemon Daemon Starting provisioning Feb 12 19:58:41.246085 waagent[1430]: 2024-02-12T19:58:41.230960Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:58:41.246085 waagent[1430]: 2024-02-12T19:58:41.231938Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-996941d352] Feb 12 19:58:41.246085 waagent[1430]: 2024-02-12T19:58:41.236451Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-996941d352] Feb 12 19:58:41.246085 waagent[1430]: 2024-02-12T19:58:41.237576Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:58:41.246085 waagent[1430]: 2024-02-12T19:58:41.238562Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:58:41.251974 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:58:41.252260 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:58:41.252334 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:58:41.252683 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:58:41.258270 systemd-networkd[1184]: eth0: DHCPv6 lease lost Feb 12 19:58:41.259633 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:58:41.259827 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:58:41.262164 systemd[1]: Starting systemd-networkd.service... Feb 12 19:58:41.293732 systemd-networkd[1482]: enP25258s1: Link UP Feb 12 19:58:41.293742 systemd-networkd[1482]: enP25258s1: Gained carrier Feb 12 19:58:41.295082 systemd-networkd[1482]: eth0: Link UP Feb 12 19:58:41.295091 systemd-networkd[1482]: eth0: Gained carrier Feb 12 19:58:41.295536 systemd-networkd[1482]: lo: Link UP Feb 12 19:58:41.295545 systemd-networkd[1482]: lo: Gained carrier Feb 12 19:58:41.295856 systemd-networkd[1482]: eth0: Gained IPv6LL Feb 12 19:58:41.296129 systemd-networkd[1482]: Enumeration completed Feb 12 19:58:41.296275 systemd[1]: Started systemd-networkd.service. Feb 12 19:58:41.298354 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:58:41.299813 waagent[1430]: 2024-02-12T19:58:41.299609Z INFO Daemon Daemon Create user account if not exists Feb 12 19:58:41.308467 waagent[1430]: 2024-02-12T19:58:41.300478Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:58:41.308467 waagent[1430]: 2024-02-12T19:58:41.301526Z INFO Daemon Daemon Configure sudoer Feb 12 19:58:41.308646 waagent[1430]: 2024-02-12T19:58:41.308544Z INFO Daemon Daemon Configure sshd Feb 12 19:58:41.313284 waagent[1430]: 2024-02-12T19:58:41.308876Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:58:41.314285 systemd-networkd[1482]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:58:41.335409 waagent[1430]: 2024-02-12T19:58:41.335279Z INFO Daemon Daemon Decode custom data Feb 12 19:58:41.340224 waagent[1430]: 2024-02-12T19:58:41.335987Z INFO Daemon Daemon Save custom data Feb 12 19:58:41.346350 systemd-networkd[1482]: eth0: DHCPv4 address 10.200.8.17/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:58:41.349848 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:58:42.603327 waagent[1430]: 2024-02-12T19:58:42.603181Z INFO Daemon Daemon Provisioning complete Feb 12 19:58:42.617661 waagent[1430]: 2024-02-12T19:58:42.617565Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:58:42.625561 waagent[1430]: 2024-02-12T19:58:42.618057Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:58:42.625561 waagent[1430]: 2024-02-12T19:58:42.619833Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:58:42.895469 waagent[1491]: 2024-02-12T19:58:42.895289Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:58:42.896204 waagent[1491]: 2024-02-12T19:58:42.896133Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:42.896374 waagent[1491]: 2024-02-12T19:58:42.896316Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:42.908028 waagent[1491]: 2024-02-12T19:58:42.907924Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:58:42.908249 waagent[1491]: 2024-02-12T19:58:42.908166Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:58:42.984724 waagent[1491]: 2024-02-12T19:58:42.984590Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0B4C451E30C3945399444C7E6357621F033370A4 Feb 12 19:58:42.984967 waagent[1491]: 2024-02-12T19:58:42.984902Z INFO ExtHandler ExtHandler Certificate with thumbprint 815BA08EF257F2876FD0B9B80686FC2A3A868506 has no matching private key. Feb 12 19:58:42.985217 waagent[1491]: 2024-02-12T19:58:42.985164Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:58:43.000092 waagent[1491]: 2024-02-12T19:58:43.000022Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 6ed5bb97-dc7f-4914-9c29-45d27e10b9eb New eTag: 14552897879771565920] Feb 12 19:58:43.000726 waagent[1491]: 2024-02-12T19:58:43.000664Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:58:43.061135 waagent[1491]: 2024-02-12T19:58:43.060988Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:58:43.070120 waagent[1491]: 2024-02-12T19:58:43.070016Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1491 Feb 12 19:58:43.073639 waagent[1491]: 2024-02-12T19:58:43.073561Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:58:43.074915 waagent[1491]: 2024-02-12T19:58:43.074849Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:58:43.133910 waagent[1491]: 2024-02-12T19:58:43.133826Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:58:43.134495 waagent[1491]: 2024-02-12T19:58:43.134404Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:58:43.142812 waagent[1491]: 2024-02-12T19:58:43.142750Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:58:43.143352 waagent[1491]: 2024-02-12T19:58:43.143285Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:58:43.144441 waagent[1491]: 2024-02-12T19:58:43.144376Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:58:43.145777 waagent[1491]: 2024-02-12T19:58:43.145686Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:58:43.146196 waagent[1491]: 2024-02-12T19:58:43.146139Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:43.147005 waagent[1491]: 2024-02-12T19:58:43.146949Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:58:43.147117 waagent[1491]: 2024-02-12T19:58:43.147059Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:43.147494 waagent[1491]: 2024-02-12T19:58:43.147430Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:43.147848 waagent[1491]: 2024-02-12T19:58:43.147789Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:58:43.148005 waagent[1491]: 2024-02-12T19:58:43.147956Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:43.148113 waagent[1491]: 2024-02-12T19:58:43.148063Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:58:43.148582 waagent[1491]: 2024-02-12T19:58:43.148523Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:58:43.148798 waagent[1491]: 2024-02-12T19:58:43.148747Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:58:43.149006 waagent[1491]: 2024-02-12T19:58:43.148958Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:58:43.149872 waagent[1491]: 2024-02-12T19:58:43.149818Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:58:43.150290 waagent[1491]: 2024-02-12T19:58:43.150212Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:58:43.151848 waagent[1491]: 2024-02-12T19:58:43.151742Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:58:43.151848 waagent[1491]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:58:43.151848 waagent[1491]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:58:43.151848 waagent[1491]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:58:43.151848 waagent[1491]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:43.151848 waagent[1491]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:43.151848 waagent[1491]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:43.155144 waagent[1491]: 2024-02-12T19:58:43.155071Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:58:43.155339 waagent[1491]: 2024-02-12T19:58:43.155260Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:58:43.166516 waagent[1491]: 2024-02-12T19:58:43.166450Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:58:43.167192 waagent[1491]: 2024-02-12T19:58:43.167142Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:58:43.169510 waagent[1491]: 2024-02-12T19:58:43.169457Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:58:43.191605 waagent[1491]: 2024-02-12T19:58:43.191460Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1482' Feb 12 19:58:43.227938 waagent[1491]: 2024-02-12T19:58:43.227844Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:58:43.258215 waagent[1491]: 2024-02-12T19:58:43.258070Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:58:43.258215 waagent[1491]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:58:43.258215 waagent[1491]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:58:43.258215 waagent[1491]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a1:8b:c6 brd ff:ff:ff:ff:ff:ff Feb 12 19:58:43.258215 waagent[1491]: 3: enP25258s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a1:8b:c6 brd ff:ff:ff:ff:ff:ff\ altname enP25258p0s2 Feb 12 19:58:43.258215 waagent[1491]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:58:43.258215 waagent[1491]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:58:43.258215 waagent[1491]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:58:43.258215 waagent[1491]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:58:43.258215 waagent[1491]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:58:43.258215 waagent[1491]: 2: eth0 inet6 fe80::222:48ff:fea1:8bc6/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:58:43.442781 waagent[1491]: 2024-02-12T19:58:43.442581Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:58:43.446122 waagent[1491]: 2024-02-12T19:58:43.445996Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:58:43.446122 waagent[1491]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:43.446122 waagent[1491]: pkts bytes target prot opt in out source destination Feb 12 19:58:43.446122 waagent[1491]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:43.446122 waagent[1491]: pkts bytes target prot opt in out source destination Feb 12 19:58:43.446122 waagent[1491]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:43.446122 waagent[1491]: pkts bytes target prot opt in out source destination Feb 12 19:58:43.446122 waagent[1491]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:58:43.446122 waagent[1491]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:58:43.447599 waagent[1491]: 2024-02-12T19:58:43.447538Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:58:43.533727 waagent[1491]: 2024-02-12T19:58:43.533646Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:58:43.623800 waagent[1430]: 2024-02-12T19:58:43.623610Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:58:43.629691 waagent[1430]: 2024-02-12T19:58:43.629619Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:58:44.670452 waagent[1529]: 2024-02-12T19:58:44.670330Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:58:44.671205 waagent[1529]: 2024-02-12T19:58:44.671132Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:58:44.671378 waagent[1529]: 2024-02-12T19:58:44.671318Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:58:44.680948 waagent[1529]: 2024-02-12T19:58:44.680823Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:58:44.681395 waagent[1529]: 2024-02-12T19:58:44.681332Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:44.681559 waagent[1529]: 2024-02-12T19:58:44.681510Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:44.693321 waagent[1529]: 2024-02-12T19:58:44.693216Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:58:44.702333 waagent[1529]: 2024-02-12T19:58:44.702259Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:58:44.703334 waagent[1529]: 2024-02-12T19:58:44.703270Z INFO ExtHandler Feb 12 19:58:44.703491 waagent[1529]: 2024-02-12T19:58:44.703442Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 186eb63b-eeac-4903-9acd-ff604c2dd252 eTag: 14552897879771565920 source: Fabric] Feb 12 19:58:44.704198 waagent[1529]: 2024-02-12T19:58:44.704139Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:58:44.705279 waagent[1529]: 2024-02-12T19:58:44.705202Z INFO ExtHandler Feb 12 19:58:44.705419 waagent[1529]: 2024-02-12T19:58:44.705368Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:58:44.712616 waagent[1529]: 2024-02-12T19:58:44.712556Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:58:44.713105 waagent[1529]: 2024-02-12T19:58:44.713052Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:58:44.736579 waagent[1529]: 2024-02-12T19:58:44.736499Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:58:44.806885 waagent[1529]: 2024-02-12T19:58:44.806739Z INFO ExtHandler Downloaded certificate {'thumbprint': '815BA08EF257F2876FD0B9B80686FC2A3A868506', 'hasPrivateKey': False} Feb 12 19:58:44.807895 waagent[1529]: 2024-02-12T19:58:44.807821Z INFO ExtHandler Downloaded certificate {'thumbprint': '0B4C451E30C3945399444C7E6357621F033370A4', 'hasPrivateKey': True} Feb 12 19:58:44.808894 waagent[1529]: 2024-02-12T19:58:44.808829Z INFO ExtHandler Fetch goal state completed Feb 12 19:58:44.830827 waagent[1529]: 2024-02-12T19:58:44.830723Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1529 Feb 12 19:58:44.834203 waagent[1529]: 2024-02-12T19:58:44.834115Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:58:44.835737 waagent[1529]: 2024-02-12T19:58:44.835670Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:58:44.840879 waagent[1529]: 2024-02-12T19:58:44.840818Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:58:44.841286 waagent[1529]: 2024-02-12T19:58:44.841211Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:58:44.849566 waagent[1529]: 2024-02-12T19:58:44.849504Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:58:44.850109 waagent[1529]: 2024-02-12T19:58:44.850045Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:58:44.871503 waagent[1529]: 2024-02-12T19:58:44.871364Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:58:44.874876 waagent[1529]: 2024-02-12T19:58:44.874745Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:58:44.879780 waagent[1529]: 2024-02-12T19:58:44.879707Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:58:44.881326 waagent[1529]: 2024-02-12T19:58:44.881262Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:58:44.881539 waagent[1529]: 2024-02-12T19:58:44.881479Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:44.882001 waagent[1529]: 2024-02-12T19:58:44.881942Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:44.882592 waagent[1529]: 2024-02-12T19:58:44.882530Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:58:44.883021 waagent[1529]: 2024-02-12T19:58:44.882965Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:58:44.883541 waagent[1529]: 2024-02-12T19:58:44.883489Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:58:44.883698 waagent[1529]: 2024-02-12T19:58:44.883648Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:58:44.884076 waagent[1529]: 2024-02-12T19:58:44.884022Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:58:44.884374 waagent[1529]: 2024-02-12T19:58:44.884318Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:58:44.884374 waagent[1529]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:58:44.884374 waagent[1529]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:58:44.884374 waagent[1529]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:58:44.884374 waagent[1529]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:44.884374 waagent[1529]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:44.884374 waagent[1529]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:58:44.884671 waagent[1529]: 2024-02-12T19:58:44.884470Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:58:44.884671 waagent[1529]: 2024-02-12T19:58:44.884611Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:58:44.885801 waagent[1529]: 2024-02-12T19:58:44.885741Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:58:44.886159 waagent[1529]: 2024-02-12T19:58:44.886114Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:58:44.895546 waagent[1529]: 2024-02-12T19:58:44.895426Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:58:44.898107 waagent[1529]: 2024-02-12T19:58:44.894940Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:58:44.898540 waagent[1529]: 2024-02-12T19:58:44.898478Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:58:44.911627 waagent[1529]: 2024-02-12T19:58:44.911548Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:58:44.913927 waagent[1529]: 2024-02-12T19:58:44.913869Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:58:44.922788 waagent[1529]: 2024-02-12T19:58:44.922609Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:58:44.922788 waagent[1529]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:58:44.922788 waagent[1529]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:58:44.922788 waagent[1529]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a1:8b:c6 brd ff:ff:ff:ff:ff:ff Feb 12 19:58:44.922788 waagent[1529]: 3: enP25258s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:a1:8b:c6 brd ff:ff:ff:ff:ff:ff\ altname enP25258p0s2 Feb 12 19:58:44.922788 waagent[1529]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:58:44.922788 waagent[1529]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:58:44.922788 waagent[1529]: 2: eth0 inet 10.200.8.17/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:58:44.922788 waagent[1529]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:58:44.922788 waagent[1529]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:58:44.922788 waagent[1529]: 2: eth0 inet6 fe80::222:48ff:fea1:8bc6/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:58:44.982749 waagent[1529]: 2024-02-12T19:58:44.982635Z INFO ExtHandler ExtHandler Feb 12 19:58:44.982994 waagent[1529]: 2024-02-12T19:58:44.982935Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 1c4cb298-935f-4468-bf52-721a6352175c correlation 5f75cbab-196a-440f-8a2a-c6574464a8be created: 2024-02-12T19:57:13.530571Z] Feb 12 19:58:44.986880 waagent[1529]: 2024-02-12T19:58:44.986811Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:58:44.989142 waagent[1529]: 2024-02-12T19:58:44.989080Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 6 ms] Feb 12 19:58:44.996273 waagent[1529]: 2024-02-12T19:58:44.996172Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:58:44.996273 waagent[1529]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:44.996273 waagent[1529]: pkts bytes target prot opt in out source destination Feb 12 19:58:44.996273 waagent[1529]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:44.996273 waagent[1529]: pkts bytes target prot opt in out source destination Feb 12 19:58:44.996273 waagent[1529]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:58:44.996273 waagent[1529]: pkts bytes target prot opt in out source destination Feb 12 19:58:44.996273 waagent[1529]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:58:44.996273 waagent[1529]: 128 14537 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:58:44.996273 waagent[1529]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:58:45.021942 waagent[1529]: 2024-02-12T19:58:45.021867Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:58:45.032744 waagent[1529]: 2024-02-12T19:58:45.032655Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 88A59261-F0C5-484B-9749-D378BC9FD039;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:59:11.350154 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 12 19:59:17.576398 update_engine[1319]: I0212 19:59:17.576333 1319 update_attempter.cc:509] Updating boot flags... Feb 12 19:59:21.374054 systemd[1]: Created slice system-sshd.slice. Feb 12 19:59:21.375647 systemd[1]: Started sshd@0-10.200.8.17:22-10.200.12.6:33590.service. Feb 12 19:59:22.168681 sshd[1610]: Accepted publickey for core from 10.200.12.6 port 33590 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:22.170352 sshd[1610]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:22.174954 systemd-logind[1316]: New session 3 of user core. Feb 12 19:59:22.175902 systemd[1]: Started session-3.scope. Feb 12 19:59:22.703676 systemd[1]: Started sshd@1-10.200.8.17:22-10.200.12.6:33596.service. Feb 12 19:59:23.338456 sshd[1615]: Accepted publickey for core from 10.200.12.6 port 33596 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:23.340108 sshd[1615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:23.345481 systemd[1]: Started session-4.scope. Feb 12 19:59:23.345919 systemd-logind[1316]: New session 4 of user core. Feb 12 19:59:23.786546 sshd[1615]: pam_unix(sshd:session): session closed for user core Feb 12 19:59:23.790016 systemd[1]: sshd@1-10.200.8.17:22-10.200.12.6:33596.service: Deactivated successfully. Feb 12 19:59:23.791066 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:59:23.791809 systemd-logind[1316]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:59:23.792637 systemd-logind[1316]: Removed session 4. Feb 12 19:59:23.892916 systemd[1]: Started sshd@2-10.200.8.17:22-10.200.12.6:33606.service. Feb 12 19:59:24.515195 sshd[1624]: Accepted publickey for core from 10.200.12.6 port 33606 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:24.516839 sshd[1624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:24.521423 systemd[1]: Started session-5.scope. Feb 12 19:59:24.521862 systemd-logind[1316]: New session 5 of user core. Feb 12 19:59:24.954568 sshd[1624]: pam_unix(sshd:session): session closed for user core Feb 12 19:59:24.957817 systemd[1]: sshd@2-10.200.8.17:22-10.200.12.6:33606.service: Deactivated successfully. Feb 12 19:59:24.958832 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:59:24.959624 systemd-logind[1316]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:59:24.960512 systemd-logind[1316]: Removed session 5. Feb 12 19:59:25.059974 systemd[1]: Started sshd@3-10.200.8.17:22-10.200.12.6:33608.service. Feb 12 19:59:25.678168 sshd[1630]: Accepted publickey for core from 10.200.12.6 port 33608 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:25.679802 sshd[1630]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:25.685412 systemd[1]: Started session-6.scope. Feb 12 19:59:25.686128 systemd-logind[1316]: New session 6 of user core. Feb 12 19:59:26.118712 sshd[1630]: pam_unix(sshd:session): session closed for user core Feb 12 19:59:26.121751 systemd[1]: sshd@3-10.200.8.17:22-10.200.12.6:33608.service: Deactivated successfully. Feb 12 19:59:26.122737 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:59:26.123534 systemd-logind[1316]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:59:26.124441 systemd-logind[1316]: Removed session 6. Feb 12 19:59:26.221916 systemd[1]: Started sshd@4-10.200.8.17:22-10.200.12.6:33616.service. Feb 12 19:59:26.839381 sshd[1636]: Accepted publickey for core from 10.200.12.6 port 33616 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:26.841057 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:26.846834 systemd[1]: Started session-7.scope. Feb 12 19:59:26.847435 systemd-logind[1316]: New session 7 of user core. Feb 12 19:59:27.438960 sudo[1639]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:59:27.439272 sudo[1639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:59:27.479479 dbus-daemon[1301]: \xd0='\xe6\xe8U: received setenforce notice (enforcing=-494776272) Feb 12 19:59:27.481451 sudo[1639]: pam_unix(sudo:session): session closed for user root Feb 12 19:59:27.638320 sshd[1636]: pam_unix(sshd:session): session closed for user core Feb 12 19:59:27.642042 systemd[1]: sshd@4-10.200.8.17:22-10.200.12.6:33616.service: Deactivated successfully. Feb 12 19:59:27.643141 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:59:27.643785 systemd-logind[1316]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:59:27.644592 systemd-logind[1316]: Removed session 7. Feb 12 19:59:27.745726 systemd[1]: Started sshd@5-10.200.8.17:22-10.200.12.6:53144.service. Feb 12 19:59:28.384034 sshd[1643]: Accepted publickey for core from 10.200.12.6 port 53144 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:28.385771 sshd[1643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:28.390582 systemd[1]: Started session-8.scope. Feb 12 19:59:28.391172 systemd-logind[1316]: New session 8 of user core. Feb 12 19:59:28.727484 sudo[1647]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:59:28.727752 sudo[1647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:59:28.730830 sudo[1647]: pam_unix(sudo:session): session closed for user root Feb 12 19:59:28.735651 sudo[1646]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:59:28.735912 sudo[1646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:59:28.744792 systemd[1]: Stopping audit-rules.service... Feb 12 19:59:28.746000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:59:28.746631 auditctl[1650]: No rules Feb 12 19:59:28.749941 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 12 19:59:28.750020 kernel: audit: type=1305 audit(1707767968.746:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:59:28.747052 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:59:28.747210 systemd[1]: Stopped audit-rules.service. Feb 12 19:59:28.750600 systemd[1]: Starting audit-rules.service... Feb 12 19:59:28.746000 audit[1650]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff81dffa20 a2=420 a3=0 items=0 ppid=1 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:28.776490 augenrules[1667]: No rules Feb 12 19:59:28.746000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:59:28.777505 systemd[1]: Finished audit-rules.service. Feb 12 19:59:28.779701 sudo[1646]: pam_unix(sudo:session): session closed for user root Feb 12 19:59:28.781321 kernel: audit: type=1300 audit(1707767968.746:178): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff81dffa20 a2=420 a3=0 items=0 ppid=1 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:28.781394 kernel: audit: type=1327 audit(1707767968.746:178): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:59:28.781418 kernel: audit: type=1131 audit(1707767968.747:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.803610 kernel: audit: type=1130 audit(1707767968.776:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.803708 kernel: audit: type=1106 audit(1707767968.776:181): pid=1646 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.776000 audit[1646]: USER_END pid=1646 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.776000 audit[1646]: CRED_DISP pid=1646 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.828031 kernel: audit: type=1104 audit(1707767968.776:182): pid=1646 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.891127 sshd[1643]: pam_unix(sshd:session): session closed for user core Feb 12 19:59:28.892000 audit[1643]: USER_END pid=1643 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:28.894843 systemd[1]: sshd@5-10.200.8.17:22-10.200.12.6:53144.service: Deactivated successfully. Feb 12 19:59:28.895702 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:59:28.896881 systemd-logind[1316]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:59:28.897782 systemd-logind[1316]: Removed session 8. Feb 12 19:59:28.892000 audit[1643]: CRED_DISP pid=1643 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:28.921389 kernel: audit: type=1106 audit(1707767968.892:183): pid=1643 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:28.921469 kernel: audit: type=1104 audit(1707767968.892:184): pid=1643 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:28.921496 kernel: audit: type=1131 audit(1707767968.894:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:53144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.17:22-10.200.12.6:53144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:53160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:28.994846 systemd[1]: Started sshd@6-10.200.8.17:22-10.200.12.6:53160.service. Feb 12 19:59:29.611000 audit[1673]: USER_ACCT pid=1673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:29.611646 sshd[1673]: Accepted publickey for core from 10.200.12.6 port 53160 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 19:59:29.612000 audit[1673]: CRED_ACQ pid=1673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:29.612000 audit[1673]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd84ea9820 a2=3 a3=0 items=0 ppid=1 pid=1673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:29.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:59:29.613384 sshd[1673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:59:29.619003 systemd[1]: Started session-9.scope. Feb 12 19:59:29.619529 systemd-logind[1316]: New session 9 of user core. Feb 12 19:59:29.623000 audit[1673]: USER_START pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:29.625000 audit[1675]: CRED_ACQ pid=1675 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:59:29.953000 audit[1676]: USER_ACCT pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:29.953000 audit[1676]: CRED_REFR pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:29.953924 sudo[1676]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:59:29.954194 sudo[1676]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:59:29.955000 audit[1676]: USER_START pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:59:31.021891 systemd[1]: Starting docker.service... Feb 12 19:59:31.070984 env[1691]: time="2024-02-12T19:59:31.070918776Z" level=info msg="Starting up" Feb 12 19:59:31.072661 env[1691]: time="2024-02-12T19:59:31.072637607Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:59:31.072805 env[1691]: time="2024-02-12T19:59:31.072794009Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:59:31.072874 env[1691]: time="2024-02-12T19:59:31.072863111Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:59:31.072914 env[1691]: time="2024-02-12T19:59:31.072906011Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:59:31.082098 env[1691]: time="2024-02-12T19:59:31.082069876Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:59:31.082300 env[1691]: time="2024-02-12T19:59:31.082284180Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:59:31.082396 env[1691]: time="2024-02-12T19:59:31.082381582Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:59:31.082465 env[1691]: time="2024-02-12T19:59:31.082454583Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:59:31.087742 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1425025237-merged.mount: Deactivated successfully. Feb 12 19:59:31.217506 env[1691]: time="2024-02-12T19:59:31.217457814Z" level=info msg="Loading containers: start." Feb 12 19:59:31.266000 audit[1719]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.266000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffca5157870 a2=0 a3=7ffca515785c items=0 ppid=1691 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.266000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:59:31.268000 audit[1721]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.268000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcb5bb9fb0 a2=0 a3=7ffcb5bb9f9c items=0 ppid=1691 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:59:31.270000 audit[1723]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.270000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc5a66df10 a2=0 a3=7ffc5a66defc items=0 ppid=1691 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:59:31.272000 audit[1725]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.272000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff391c8e00 a2=0 a3=7fff391c8dec items=0 ppid=1691 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:59:31.274000 audit[1727]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.274000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff995bf6f0 a2=0 a3=7fff995bf6dc items=0 ppid=1691 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.274000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:59:31.276000 audit[1729]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.276000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd80f3f4c0 a2=0 a3=7ffd80f3f4ac items=0 ppid=1691 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.276000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:59:31.291000 audit[1731]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.291000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2ba2e860 a2=0 a3=7ffe2ba2e84c items=0 ppid=1691 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:59:31.293000 audit[1733]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.293000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc27c98020 a2=0 a3=7ffc27c9800c items=0 ppid=1691 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:59:31.295000 audit[1735]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.295000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe0b3525d0 a2=0 a3=7ffe0b3525bc items=0 ppid=1691 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:59:31.327000 audit[1739]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.327000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd20b6e2f0 a2=0 a3=7ffd20b6e2dc items=0 ppid=1691 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:59:31.328000 audit[1740]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.328000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffcec21ad0 a2=0 a3=7fffcec21abc items=0 ppid=1691 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:59:31.372257 kernel: Initializing XFRM netlink socket Feb 12 19:59:31.406900 env[1691]: time="2024-02-12T19:59:31.406848024Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:59:31.475000 audit[1748]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.475000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff3a421aa0 a2=0 a3=7fff3a421a8c items=0 ppid=1691 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.475000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:59:31.496000 audit[1751]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.496000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe019e05d0 a2=0 a3=7ffe019e05bc items=0 ppid=1691 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:59:31.499000 audit[1754]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.499000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed75d1c70 a2=0 a3=7ffed75d1c5c items=0 ppid=1691 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.499000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:59:31.501000 audit[1756]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.501000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff7e05bef0 a2=0 a3=7fff7e05bedc items=0 ppid=1691 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.501000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:59:31.503000 audit[1758]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.503000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff52c4bd80 a2=0 a3=7fff52c4bd6c items=0 ppid=1691 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:59:31.505000 audit[1760]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.505000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe87f58f30 a2=0 a3=7ffe87f58f1c items=0 ppid=1691 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:59:31.507000 audit[1762]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.507000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd0b70ba0 a2=0 a3=7fffd0b70b8c items=0 ppid=1691 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.507000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:59:31.509000 audit[1764]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.509000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff8760e8b0 a2=0 a3=7fff8760e89c items=0 ppid=1691 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:59:31.511000 audit[1766]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.511000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdfdef4c50 a2=0 a3=7ffdfdef4c3c items=0 ppid=1691 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.511000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:59:31.513000 audit[1768]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.513000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc146c6c70 a2=0 a3=7ffc146c6c5c items=0 ppid=1691 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.513000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:59:31.515000 audit[1770]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.515000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6b4bb3f0 a2=0 a3=7ffd6b4bb3dc items=0 ppid=1691 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.515000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:59:31.516393 systemd-networkd[1482]: docker0: Link UP Feb 12 19:59:31.535000 audit[1774]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.535000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb415c950 a2=0 a3=7ffdb415c93c items=0 ppid=1691 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.535000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:59:31.536000 audit[1775]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:31.536000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff3ddeb430 a2=0 a3=7fff3ddeb41c items=0 ppid=1691 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:31.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:59:31.537872 env[1691]: time="2024-02-12T19:59:31.537839583Z" level=info msg="Loading containers: done." Feb 12 19:59:31.549328 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2548263689-merged.mount: Deactivated successfully. Feb 12 19:59:31.601812 env[1691]: time="2024-02-12T19:59:31.601754934Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:59:31.602098 env[1691]: time="2024-02-12T19:59:31.602058639Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:59:31.602264 env[1691]: time="2024-02-12T19:59:31.602222742Z" level=info msg="Daemon has completed initialization" Feb 12 19:59:31.636260 systemd[1]: Started docker.service. Feb 12 19:59:31.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:31.644198 env[1691]: time="2024-02-12T19:59:31.644135597Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:59:31.663293 systemd[1]: Reloading. Feb 12 19:59:31.747752 /usr/lib/systemd/system-generators/torcx-generator[1822]: time="2024-02-12T19:59:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:59:31.747790 /usr/lib/systemd/system-generators/torcx-generator[1822]: time="2024-02-12T19:59:31Z" level=info msg="torcx already run" Feb 12 19:59:31.831310 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:59:31.831331 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:59:31.847747 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit: BPF prog-id=38 op=LOAD Feb 12 19:59:31.917000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit: BPF prog-id=39 op=LOAD Feb 12 19:59:31.918000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit: BPF prog-id=40 op=LOAD Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.918000 audit: BPF prog-id=41 op=LOAD Feb 12 19:59:31.918000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:59:31.918000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit: BPF prog-id=42 op=LOAD Feb 12 19:59:31.919000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit: BPF prog-id=43 op=LOAD Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.919000 audit: BPF prog-id=44 op=LOAD Feb 12 19:59:31.919000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:59:31.919000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.920000 audit: BPF prog-id=45 op=LOAD Feb 12 19:59:31.920000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.925000 audit: BPF prog-id=46 op=LOAD Feb 12 19:59:31.925000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.926000 audit: BPF prog-id=47 op=LOAD Feb 12 19:59:31.926000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit: BPF prog-id=48 op=LOAD Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.927000 audit: BPF prog-id=49 op=LOAD Feb 12 19:59:31.927000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:59:31.927000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:59:31.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit: BPF prog-id=50 op=LOAD Feb 12 19:59:31.930000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit: BPF prog-id=51 op=LOAD Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:31.930000 audit: BPF prog-id=52 op=LOAD Feb 12 19:59:31.930000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:59:31.930000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:59:31.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:31.943042 systemd[1]: Started kubelet.service. Feb 12 19:59:32.017882 kubelet[1883]: E0212 19:59:32.017807 1883 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:59:32.019665 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:59:32.019825 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:59:32.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:59:35.422324 env[1331]: time="2024-02-12T19:59:35.422270932Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 19:59:36.217675 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1831948260.mount: Deactivated successfully. Feb 12 19:59:38.348824 env[1331]: time="2024-02-12T19:59:38.348757450Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:38.357207 env[1331]: time="2024-02-12T19:59:38.357152446Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:38.362599 env[1331]: time="2024-02-12T19:59:38.362548408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:38.367052 env[1331]: time="2024-02-12T19:59:38.367003359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:38.367652 env[1331]: time="2024-02-12T19:59:38.367616666Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 19:59:38.378285 env[1331]: time="2024-02-12T19:59:38.378252488Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 19:59:40.515905 env[1331]: time="2024-02-12T19:59:40.515842660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:40.524480 env[1331]: time="2024-02-12T19:59:40.524433746Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:40.531102 env[1331]: time="2024-02-12T19:59:40.531070813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:40.536116 env[1331]: time="2024-02-12T19:59:40.536087364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:40.536702 env[1331]: time="2024-02-12T19:59:40.536671669Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 19:59:40.546604 env[1331]: time="2024-02-12T19:59:40.546577569Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 19:59:41.711781 env[1331]: time="2024-02-12T19:59:41.711719758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:41.718055 env[1331]: time="2024-02-12T19:59:41.718004618Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:41.723202 env[1331]: time="2024-02-12T19:59:41.723154766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:41.730133 env[1331]: time="2024-02-12T19:59:41.730092632Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:41.730743 env[1331]: time="2024-02-12T19:59:41.730707938Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 19:59:41.740473 env[1331]: time="2024-02-12T19:59:41.740438629Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 19:59:42.044501 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 12 19:59:42.044613 kernel: audit: type=1130 audit(1707767982.038:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.039310 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:59:42.039543 systemd[1]: Stopped kubelet.service. Feb 12 19:59:42.045605 systemd[1]: Started kubelet.service. Feb 12 19:59:42.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.067429 kernel: audit: type=1131 audit(1707767982.038:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.078882 kernel: audit: type=1130 audit(1707767982.044:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:42.100673 kubelet[1917]: E0212 19:59:42.100622 1917 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:59:42.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:59:42.103949 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:59:42.104063 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:59:42.118304 kernel: audit: type=1131 audit(1707767982.103:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:59:42.959238 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3694855791.mount: Deactivated successfully. Feb 12 19:59:43.450512 env[1331]: time="2024-02-12T19:59:43.450454975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.461670 env[1331]: time="2024-02-12T19:59:43.461614301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.465983 env[1331]: time="2024-02-12T19:59:43.465945067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.470393 env[1331]: time="2024-02-12T19:59:43.470360435Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.470886 env[1331]: time="2024-02-12T19:59:43.470856754Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 19:59:43.480633 env[1331]: time="2024-02-12T19:59:43.480599727Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:59:43.939903 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3491111787.mount: Deactivated successfully. Feb 12 19:59:43.967407 env[1331]: time="2024-02-12T19:59:43.967348326Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.977398 env[1331]: time="2024-02-12T19:59:43.977346608Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.981507 env[1331]: time="2024-02-12T19:59:43.981461865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.985997 env[1331]: time="2024-02-12T19:59:43.985959637Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:43.986415 env[1331]: time="2024-02-12T19:59:43.986381753Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:59:43.996375 env[1331]: time="2024-02-12T19:59:43.996341834Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 19:59:44.701907 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1968668267.mount: Deactivated successfully. Feb 12 19:59:48.901654 env[1331]: time="2024-02-12T19:59:48.901595897Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:48.909502 env[1331]: time="2024-02-12T19:59:48.909450258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:48.914250 env[1331]: time="2024-02-12T19:59:48.914171215Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:48.919529 env[1331]: time="2024-02-12T19:59:48.919491191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:48.920036 env[1331]: time="2024-02-12T19:59:48.920003908Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 19:59:48.929757 env[1331]: time="2024-02-12T19:59:48.929721731Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 19:59:49.515807 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4215453210.mount: Deactivated successfully. Feb 12 19:59:50.183575 env[1331]: time="2024-02-12T19:59:50.183512859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:50.247206 env[1331]: time="2024-02-12T19:59:50.247141360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:50.252169 env[1331]: time="2024-02-12T19:59:50.252121917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:50.258144 env[1331]: time="2024-02-12T19:59:50.258095905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:50.258580 env[1331]: time="2024-02-12T19:59:50.258543719Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 19:59:52.289425 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:59:52.309978 kernel: audit: type=1130 audit(1707767992.288:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.289696 systemd[1]: Stopped kubelet.service. Feb 12 19:59:52.309375 systemd[1]: Started kubelet.service. Feb 12 19:59:52.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.328244 kernel: audit: type=1131 audit(1707767992.288:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.346244 kernel: audit: type=1130 audit(1707767992.308:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:52.419987 kubelet[1999]: E0212 19:59:52.419813 1999 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:59:52.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:59:52.422523 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:59:52.422681 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:59:52.439258 kernel: audit: type=1131 audit(1707767992.421:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:59:53.101522 systemd[1]: Stopped kubelet.service. Feb 12 19:59:53.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:53.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:53.124985 systemd[1]: Reloading. Feb 12 19:59:53.134863 kernel: audit: type=1130 audit(1707767993.100:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:53.134998 kernel: audit: type=1131 audit(1707767993.100:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:53.214520 /usr/lib/systemd/system-generators/torcx-generator[2029]: time="2024-02-12T19:59:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:59:53.214560 /usr/lib/systemd/system-generators/torcx-generator[2029]: time="2024-02-12T19:59:53Z" level=info msg="torcx already run" Feb 12 19:59:53.296249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:59:53.296270 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:59:53.312549 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.398312 kernel: audit: type=1400 audit(1707767993.381:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.425489 kernel: audit: type=1400 audit(1707767993.381:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.425651 kernel: audit: type=1400 audit(1707767993.381:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439773 kernel: audit: type=1400 audit(1707767993.381:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.396000 audit: BPF prog-id=53 op=LOAD Feb 12 19:59:53.396000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit: BPF prog-id=54 op=LOAD Feb 12 19:59:53.410000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit: BPF prog-id=55 op=LOAD Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit: BPF prog-id=56 op=LOAD Feb 12 19:59:53.439000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:59:53.439000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit: BPF prog-id=57 op=LOAD Feb 12 19:59:53.439000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit: BPF prog-id=58 op=LOAD Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.439000 audit: BPF prog-id=59 op=LOAD Feb 12 19:59:53.439000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:59:53.439000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.440000 audit: BPF prog-id=60 op=LOAD Feb 12 19:59:53.440000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.444000 audit: BPF prog-id=61 op=LOAD Feb 12 19:59:53.444000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit: BPF prog-id=62 op=LOAD Feb 12 19:59:53.446000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit: BPF prog-id=63 op=LOAD Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.446000 audit: BPF prog-id=64 op=LOAD Feb 12 19:59:53.446000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:59:53.446000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit: BPF prog-id=65 op=LOAD Feb 12 19:59:53.449000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit: BPF prog-id=66 op=LOAD Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.449000 audit: BPF prog-id=67 op=LOAD Feb 12 19:59:53.450000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:59:53.450000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:59:53.469252 systemd[1]: Started kubelet.service. Feb 12 19:59:53.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:59:53.526305 kubelet[2091]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:59:53.526649 kubelet[2091]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:59:53.526791 kubelet[2091]: I0212 19:59:53.526758 2091 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:59:53.528293 kubelet[2091]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:59:53.528379 kubelet[2091]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:59:53.700056 kubelet[2091]: I0212 19:59:53.699945 2091 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:59:53.700056 kubelet[2091]: I0212 19:59:53.699973 2091 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:59:53.700493 kubelet[2091]: I0212 19:59:53.700473 2091 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:59:53.705951 kubelet[2091]: E0212 19:59:53.705914 2091 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.706104 kubelet[2091]: I0212 19:59:53.705967 2091 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:59:53.708293 kubelet[2091]: I0212 19:59:53.708272 2091 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:59:53.708526 kubelet[2091]: I0212 19:59:53.708508 2091 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:59:53.708623 kubelet[2091]: I0212 19:59:53.708606 2091 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:59:53.708755 kubelet[2091]: I0212 19:59:53.708636 2091 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:59:53.708755 kubelet[2091]: I0212 19:59:53.708652 2091 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:59:53.708837 kubelet[2091]: I0212 19:59:53.708771 2091 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:59:53.711603 kubelet[2091]: I0212 19:59:53.711584 2091 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:59:53.711702 kubelet[2091]: I0212 19:59:53.711622 2091 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:59:53.711702 kubelet[2091]: I0212 19:59:53.711652 2091 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:59:53.711702 kubelet[2091]: I0212 19:59:53.711670 2091 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:59:53.712483 kubelet[2091]: W0212 19:59:53.712408 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-996941d352&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.712483 kubelet[2091]: E0212 19:59:53.712477 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-996941d352&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.712609 kubelet[2091]: W0212 19:59:53.712549 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.712609 kubelet[2091]: E0212 19:59:53.712585 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.712694 kubelet[2091]: I0212 19:59:53.712653 2091 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:59:53.712942 kubelet[2091]: W0212 19:59:53.712923 2091 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:59:53.714015 kubelet[2091]: I0212 19:59:53.713990 2091 server.go:1186] "Started kubelet" Feb 12 19:59:53.716541 kubelet[2091]: E0212 19:59:53.716409 2091 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-996941d352.17b335f1301a4050", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-996941d352", UID:"ci-3510.3.2-a-996941d352", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-996941d352"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 59, 53, 713967184, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 59, 53, 713967184, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.8.17:6443/api/v1/namespaces/default/events": dial tcp 10.200.8.17:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:59:53.717000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.717000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:59:53.717000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f1e600 a1=c000e72930 a2=c000f1e5d0 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.717000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:59:53.719385 kubelet[2091]: I0212 19:59:53.719370 2091 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:59:53.718000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.718000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:59:53.718000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b777a0 a1=c000e72948 a2=c000f1e690 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.718000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:59:53.719730 kubelet[2091]: I0212 19:59:53.719718 2091 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:59:53.719869 kubelet[2091]: I0212 19:59:53.719858 2091 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:59:53.724494 kubelet[2091]: I0212 19:59:53.724476 2091 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:59:53.725100 kubelet[2091]: E0212 19:59:53.724834 2091 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:59:53.725100 kubelet[2091]: E0212 19:59:53.724864 2091 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:59:53.724000 audit[2101]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.724000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe57143830 a2=0 a3=7ffe5714381c items=0 ppid=2091 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:59:53.726717 kubelet[2091]: I0212 19:59:53.726694 2091 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:59:53.727315 kubelet[2091]: I0212 19:59:53.727297 2091 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:59:53.727383 kubelet[2091]: I0212 19:59:53.727349 2091 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:59:53.727000 audit[2102]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.727000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd6a00db0 a2=0 a3=7fffd6a00d9c items=0 ppid=2091 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:59:53.730000 audit[2104]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.730000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc97abb50 a2=0 a3=7ffcc97abb3c items=0 ppid=2091 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:59:53.732000 audit[2106]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.732000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff214ad110 a2=0 a3=7fff214ad0fc items=0 ppid=2091 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:59:53.743212 kubelet[2091]: W0212 19:59:53.743148 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.743344 kubelet[2091]: E0212 19:59:53.743223 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.743344 kubelet[2091]: E0212 19:59:53.743320 2091 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-996941d352?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.790000 audit[2112]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.790000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc5c8697a0 a2=0 a3=7ffc5c86978c items=0 ppid=2091 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:59:53.792000 audit[2113]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2113 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.792000 audit[2113]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff86f79510 a2=0 a3=7fff86f794fc items=0 ppid=2091 pid=2113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:59:53.819355 kubelet[2091]: I0212 19:59:53.819329 2091 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:59:53.819561 kubelet[2091]: I0212 19:59:53.819541 2091 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:59:53.819628 kubelet[2091]: I0212 19:59:53.819565 2091 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:59:53.825391 kubelet[2091]: I0212 19:59:53.825357 2091 policy_none.go:49] "None policy: Start" Feb 12 19:59:53.826890 kubelet[2091]: I0212 19:59:53.826727 2091 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:59:53.826890 kubelet[2091]: I0212 19:59:53.826752 2091 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:59:53.827048 kubelet[2091]: I0212 19:59:53.827002 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:53.827349 kubelet[2091]: E0212 19:59:53.827323 2091 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:53.836879 systemd[1]: Created slice kubepods.slice. Feb 12 19:59:53.837000 audit[2117]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.837000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdcfa815d0 a2=0 a3=7ffdcfa815bc items=0 ppid=2091 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:59:53.841385 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:59:53.844730 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:59:53.846000 audit[2120]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.846000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff246db710 a2=0 a3=7fff246db6fc items=0 ppid=2091 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.846000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:59:53.847000 audit[2121]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.847000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee43d7bd0 a2=0 a3=7ffee43d7bbc items=0 ppid=2091 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:59:53.848000 audit[2122]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.848000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff924f3dd0 a2=0 a3=7fff924f3dbc items=0 ppid=2091 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:59:53.850000 audit[2124]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.850000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc490b1f80 a2=0 a3=7ffc490b1f6c items=0 ppid=2091 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:59:53.852927 kubelet[2091]: I0212 19:59:53.852901 2091 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:59:53.851000 audit[2091]: AVC avc: denied { mac_admin } for pid=2091 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:53.851000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:59:53.851000 audit[2091]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c21da0 a1=c001023368 a2=c000c21d70 a3=25 items=0 ppid=1 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.851000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:59:53.853263 kubelet[2091]: I0212 19:59:53.852981 2091 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:59:53.853263 kubelet[2091]: I0212 19:59:53.853159 2091 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:59:53.855825 kubelet[2091]: E0212 19:59:53.855593 2091 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-996941d352\" not found" Feb 12 19:59:53.855000 audit[2126]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.855000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff0c5b4f50 a2=0 a3=7fff0c5b4f3c items=0 ppid=2091 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:59:53.857000 audit[2128]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.857000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffea4f73350 a2=0 a3=7ffea4f7333c items=0 ppid=2091 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:59:53.860000 audit[2130]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.860000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe6f35b0e0 a2=0 a3=7ffe6f35b0cc items=0 ppid=2091 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:59:53.862000 audit[2132]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.862000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff9daee950 a2=0 a3=7fff9daee93c items=0 ppid=2091 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:59:53.864095 kubelet[2091]: I0212 19:59:53.864074 2091 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:59:53.863000 audit[2133]: NETFILTER_CFG table=mangle:45 family=10 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.863000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc647c5c20 a2=0 a3=7ffc647c5c0c items=0 ppid=2091 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:59:53.864000 audit[2134]: NETFILTER_CFG table=mangle:46 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.864000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec592bd70 a2=0 a3=7ffec592bd5c items=0 ppid=2091 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:59:53.865000 audit[2135]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.865000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffce6314f50 a2=0 a3=7ffce6314f3c items=0 ppid=2091 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.865000 audit[2136]: NETFILTER_CFG table=nat:48 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.865000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd7d398f0 a2=0 a3=7ffdd7d398dc items=0 ppid=2091 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:59:53.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:59:53.866000 audit[2137]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:59:53.866000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb4b7e220 a2=0 a3=7fffb4b7e20c items=0 ppid=2091 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:59:53.867000 audit[2139]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.867000 audit[2139]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffce58c2b40 a2=0 a3=7ffce58c2b2c items=0 ppid=2091 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:59:53.869000 audit[2140]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.869000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffcf5e80170 a2=0 a3=7ffcf5e8015c items=0 ppid=2091 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:59:53.871000 audit[2142]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2142 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.871000 audit[2142]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffc02aa4ea0 a2=0 a3=7ffc02aa4e8c items=0 ppid=2091 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:59:53.872000 audit[2143]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.872000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff44d40090 a2=0 a3=7fff44d4007c items=0 ppid=2091 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:59:53.873000 audit[2144]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.873000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86442130 a2=0 a3=7ffc8644211c items=0 ppid=2091 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.873000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:59:53.875000 audit[2146]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.875000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff6a0642b0 a2=0 a3=7fff6a06429c items=0 ppid=2091 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:59:53.877000 audit[2148]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.877000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffde09e3800 a2=0 a3=7ffde09e37ec items=0 ppid=2091 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.877000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:59:53.879000 audit[2150]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.879000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc43784590 a2=0 a3=7ffc4378457c items=0 ppid=2091 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:59:53.881000 audit[2152]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.881000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe7b20daa0 a2=0 a3=7ffe7b20da8c items=0 ppid=2091 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.881000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:59:53.899000 audit[2154]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.899000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffe85c36070 a2=0 a3=7ffe85c3605c items=0 ppid=2091 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:59:53.900948 kubelet[2091]: I0212 19:59:53.900859 2091 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:59:53.900948 kubelet[2091]: I0212 19:59:53.900882 2091 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:59:53.900948 kubelet[2091]: I0212 19:59:53.900906 2091 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:59:53.901091 kubelet[2091]: E0212 19:59:53.900952 2091 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:59:53.901523 kubelet[2091]: W0212 19:59:53.901492 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.901646 kubelet[2091]: E0212 19:59:53.901529 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:53.901000 audit[2155]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.901000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9f6deba0 a2=0 a3=7ffc9f6deb8c items=0 ppid=2091 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:59:53.902000 audit[2156]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.902000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3db2e180 a2=0 a3=7fff3db2e16c items=0 ppid=2091 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:59:53.903000 audit[2157]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:59:53.903000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3f4d8b80 a2=0 a3=7ffd3f4d8b6c items=0 ppid=2091 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:53.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:59:53.943937 kubelet[2091]: E0212 19:59:53.943882 2091 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-996941d352?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.002215 kubelet[2091]: I0212 19:59:54.002067 2091 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:59:54.004505 kubelet[2091]: I0212 19:59:54.004478 2091 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:59:54.008687 kubelet[2091]: I0212 19:59:54.006539 2091 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:59:54.008687 kubelet[2091]: I0212 19:59:54.007972 2091 status_manager.go:698] "Failed to get status for pod" podUID=e193df86b7261621d27e628d2da0ce16 pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-996941d352\": dial tcp 10.200.8.17:6443: connect: connection refused" Feb 12 19:59:54.011948 kubelet[2091]: I0212 19:59:54.011799 2091 status_manager.go:698] "Failed to get status for pod" podUID=a2d7b63f1098b8b3de3cac50f63cb265 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-996941d352\": dial tcp 10.200.8.17:6443: connect: connection refused" Feb 12 19:59:54.013574 kubelet[2091]: I0212 19:59:54.013554 2091 status_manager.go:698] "Failed to get status for pod" podUID=a2293855ed1a07723edf941b46af801f pod="kube-system/kube-scheduler-ci-3510.3.2-a-996941d352" err="Get \"https://10.200.8.17:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-996941d352\": dial tcp 10.200.8.17:6443: connect: connection refused" Feb 12 19:59:54.016060 systemd[1]: Created slice kubepods-burstable-pode193df86b7261621d27e628d2da0ce16.slice. Feb 12 19:59:54.034268 systemd[1]: Created slice kubepods-burstable-poda2d7b63f1098b8b3de3cac50f63cb265.slice. Feb 12 19:59:54.034982 kubelet[2091]: I0212 19:59:54.034961 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035088 kubelet[2091]: I0212 19:59:54.035031 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035088 kubelet[2091]: I0212 19:59:54.035069 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2293855ed1a07723edf941b46af801f-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-996941d352\" (UID: \"a2293855ed1a07723edf941b46af801f\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035182 kubelet[2091]: I0212 19:59:54.035099 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035182 kubelet[2091]: I0212 19:59:54.035128 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035182 kubelet[2091]: I0212 19:59:54.035175 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035318 kubelet[2091]: I0212 19:59:54.035206 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035318 kubelet[2091]: I0212 19:59:54.035246 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.035318 kubelet[2091]: I0212 19:59:54.035287 2091 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 19:59:54.037327 kubelet[2091]: I0212 19:59:54.036898 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:54.037411 kubelet[2091]: E0212 19:59:54.037388 2091 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:54.040742 systemd[1]: Created slice kubepods-burstable-poda2293855ed1a07723edf941b46af801f.slice. Feb 12 19:59:54.329771 env[1331]: time="2024-02-12T19:59:54.329712970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-996941d352,Uid:e193df86b7261621d27e628d2da0ce16,Namespace:kube-system,Attempt:0,}" Feb 12 19:59:54.340456 env[1331]: time="2024-02-12T19:59:54.340419371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-996941d352,Uid:a2d7b63f1098b8b3de3cac50f63cb265,Namespace:kube-system,Attempt:0,}" Feb 12 19:59:54.343960 env[1331]: time="2024-02-12T19:59:54.343925370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-996941d352,Uid:a2293855ed1a07723edf941b46af801f,Namespace:kube-system,Attempt:0,}" Feb 12 19:59:54.344406 kubelet[2091]: E0212 19:59:54.344374 2091 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-996941d352?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.439674 kubelet[2091]: I0212 19:59:54.439637 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:54.440074 kubelet[2091]: E0212 19:59:54.440050 2091 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:54.546121 kubelet[2091]: W0212 19:59:54.546051 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.546121 kubelet[2091]: E0212 19:59:54.546123 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.724835 kubelet[2091]: W0212 19:59:54.724723 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.724835 kubelet[2091]: E0212 19:59:54.724777 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:54.821513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3258347138.mount: Deactivated successfully. Feb 12 19:59:54.850695 env[1331]: time="2024-02-12T19:59:54.850638359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.855649 env[1331]: time="2024-02-12T19:59:54.855601399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.870141 env[1331]: time="2024-02-12T19:59:54.870088408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.874328 env[1331]: time="2024-02-12T19:59:54.874288026Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.879420 env[1331]: time="2024-02-12T19:59:54.879384070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.885026 env[1331]: time="2024-02-12T19:59:54.884990928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.889709 env[1331]: time="2024-02-12T19:59:54.889677060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.892778 env[1331]: time="2024-02-12T19:59:54.892749747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.897659 env[1331]: time="2024-02-12T19:59:54.897631685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.902115 env[1331]: time="2024-02-12T19:59:54.902073110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.906395 env[1331]: time="2024-02-12T19:59:54.906364831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.913186 env[1331]: time="2024-02-12T19:59:54.913155222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:59:54.997681 env[1331]: time="2024-02-12T19:59:54.996557674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:59:54.997681 env[1331]: time="2024-02-12T19:59:54.996618776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:59:54.997681 env[1331]: time="2024-02-12T19:59:54.996634476Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:59:54.997681 env[1331]: time="2024-02-12T19:59:54.996828682Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fac89a0cfc5cb670ec43432c0c5f01e30288fdbe206e3ec7dae9a40cb0952a1 pid=2166 runtime=io.containerd.runc.v2 Feb 12 19:59:55.006673 env[1331]: time="2024-02-12T19:59:55.006456650Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:59:55.006673 env[1331]: time="2024-02-12T19:59:55.006496751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:59:55.006673 env[1331]: time="2024-02-12T19:59:55.006519051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:59:55.008826 env[1331]: time="2024-02-12T19:59:55.006713557Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff pid=2183 runtime=io.containerd.runc.v2 Feb 12 19:59:55.020112 systemd[1]: Started cri-containerd-6fac89a0cfc5cb670ec43432c0c5f01e30288fdbe206e3ec7dae9a40cb0952a1.scope. Feb 12 19:59:55.036137 env[1331]: time="2024-02-12T19:59:55.036070562Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:59:55.036320 env[1331]: time="2024-02-12T19:59:55.036143664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:59:55.036320 env[1331]: time="2024-02-12T19:59:55.036168865Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:59:55.036428 env[1331]: time="2024-02-12T19:59:55.036314569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de pid=2217 runtime=io.containerd.runc.v2 Feb 12 19:59:55.046033 systemd[1]: Started cri-containerd-c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff.scope. Feb 12 19:59:55.070653 systemd[1]: Started cri-containerd-3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de.scope. Feb 12 19:59:55.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit: BPF prog-id=68 op=LOAD Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2183 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663463313931356561383661656336383265343063613030623231 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2183 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663463313931356561383661656336383265343063613030623231 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit: BPF prog-id=69 op=LOAD Feb 12 19:59:55.071000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000251f0 items=0 ppid=2183 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663463313931356561383661656336383265343063613030623231 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.071000 audit: BPF prog-id=70 op=LOAD Feb 12 19:59:55.071000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025238 items=0 ppid=2183 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663463313931356561383661656336383265343063613030623231 Feb 12 19:59:55.072000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:59:55.072000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.072000 audit: BPF prog-id=71 op=LOAD Feb 12 19:59:55.072000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025648 items=0 ppid=2183 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330663463313931356561383661656336383265343063613030623231 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.077000 audit: BPF prog-id=72 op=LOAD Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666616338396130636663356362363730656334333433326330633566 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666616338396130636663356362363730656334333433326330633566 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit: BPF prog-id=73 op=LOAD Feb 12 19:59:55.078000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000256d0 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666616338396130636663356362363730656334333433326330633566 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit: BPF prog-id=74 op=LOAD Feb 12 19:59:55.078000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025718 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666616338396130636663356362363730656334333433326330633566 Feb 12 19:59:55.078000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:59:55.078000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.078000 audit: BPF prog-id=75 op=LOAD Feb 12 19:59:55.078000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025b28 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666616338396130636663356362363730656334333433326330633566 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.112000 audit: BPF prog-id=76 op=LOAD Feb 12 19:59:55.114000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.114000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2217 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653738373631623031376366363462376663643163643434376634 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2217 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653738373631623031376366363462376663643163643434376634 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.115000 audit: BPF prog-id=77 op=LOAD Feb 12 19:59:55.115000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000380f80 items=0 ppid=2217 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653738373631623031376366363462376663643163643434376634 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.118000 audit: BPF prog-id=78 op=LOAD Feb 12 19:59:55.118000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000380fc8 items=0 ppid=2217 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653738373631623031376366363462376663643163643434376634 Feb 12 19:59:55.119000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:59:55.119000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { perfmon } for pid=2229 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit[2229]: AVC avc: denied { bpf } for pid=2229 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.119000 audit: BPF prog-id=79 op=LOAD Feb 12 19:59:55.119000 audit[2229]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003813d8 items=0 ppid=2217 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653738373631623031376366363462376663643163643434376634 Feb 12 19:59:55.123654 env[1331]: time="2024-02-12T19:59:55.123614766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-996941d352,Uid:e193df86b7261621d27e628d2da0ce16,Namespace:kube-system,Attempt:0,} returns sandbox id \"6fac89a0cfc5cb670ec43432c0c5f01e30288fdbe206e3ec7dae9a40cb0952a1\"" Feb 12 19:59:55.127564 env[1331]: time="2024-02-12T19:59:55.127523373Z" level=info msg="CreateContainer within sandbox \"6fac89a0cfc5cb670ec43432c0c5f01e30288fdbe206e3ec7dae9a40cb0952a1\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:59:55.145208 kubelet[2091]: E0212 19:59:55.145129 2091 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-996941d352?timeout=10s": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:55.153947 env[1331]: time="2024-02-12T19:59:55.153566188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-996941d352,Uid:a2293855ed1a07723edf941b46af801f,Namespace:kube-system,Attempt:0,} returns sandbox id \"c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff\"" Feb 12 19:59:55.159186 env[1331]: time="2024-02-12T19:59:55.159137841Z" level=info msg="CreateContainer within sandbox \"c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:59:55.166081 env[1331]: time="2024-02-12T19:59:55.166031530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-996941d352,Uid:a2d7b63f1098b8b3de3cac50f63cb265,Namespace:kube-system,Attempt:0,} returns sandbox id \"3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de\"" Feb 12 19:59:55.168973 env[1331]: time="2024-02-12T19:59:55.168941210Z" level=info msg="CreateContainer within sandbox \"3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:59:55.213737 env[1331]: time="2024-02-12T19:59:55.213667638Z" level=info msg="CreateContainer within sandbox \"6fac89a0cfc5cb670ec43432c0c5f01e30288fdbe206e3ec7dae9a40cb0952a1\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fe6203ed01f874a714f9800e656c5441499879d69197f145f463dbf01a7b4f20\"" Feb 12 19:59:55.214446 env[1331]: time="2024-02-12T19:59:55.214411558Z" level=info msg="StartContainer for \"fe6203ed01f874a714f9800e656c5441499879d69197f145f463dbf01a7b4f20\"" Feb 12 19:59:55.214584 kubelet[2091]: W0212 19:59:55.214398 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-996941d352&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:55.214584 kubelet[2091]: E0212 19:59:55.214473 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-996941d352&limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:55.225951 env[1331]: time="2024-02-12T19:59:55.225891773Z" level=info msg="CreateContainer within sandbox \"c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5\"" Feb 12 19:59:55.226542 env[1331]: time="2024-02-12T19:59:55.226510690Z" level=info msg="StartContainer for \"a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5\"" Feb 12 19:59:55.230341 kubelet[2091]: W0212 19:59:55.230161 2091 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:55.230341 kubelet[2091]: E0212 19:59:55.230240 2091 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.17:6443: connect: connection refused Feb 12 19:59:55.233802 systemd[1]: Started cri-containerd-fe6203ed01f874a714f9800e656c5441499879d69197f145f463dbf01a7b4f20.scope. Feb 12 19:59:55.239414 env[1331]: time="2024-02-12T19:59:55.239370543Z" level=info msg="CreateContainer within sandbox \"3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362\"" Feb 12 19:59:55.242080 env[1331]: time="2024-02-12T19:59:55.241830711Z" level=info msg="StartContainer for \"28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362\"" Feb 12 19:59:55.244441 kubelet[2091]: I0212 19:59:55.243339 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:55.244441 kubelet[2091]: E0212 19:59:55.243734 2091 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.8.17:6443/api/v1/nodes\": dial tcp 10.200.8.17:6443: connect: connection refused" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.267000 audit: BPF prog-id=80 op=LOAD Feb 12 19:59:55.265852 systemd[1]: Started cri-containerd-a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5.scope. Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363230336564303166383734613731346639383030653635366335 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363230336564303166383734613731346639383030653635366335 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit: BPF prog-id=81 op=LOAD Feb 12 19:59:55.276000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e0640 items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363230336564303166383734613731346639383030653635366335 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit: BPF prog-id=82 op=LOAD Feb 12 19:59:55.276000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e0688 items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363230336564303166383734613731346639383030653635366335 Feb 12 19:59:55.276000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:59:55.276000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.276000 audit: BPF prog-id=83 op=LOAD Feb 12 19:59:55.276000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e0a98 items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665363230336564303166383734613731346639383030653635366335 Feb 12 19:59:55.292946 systemd[1]: Started cri-containerd-28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362.scope. Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit: BPF prog-id=84 op=LOAD Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2183 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363431343330383338656537366231323162396634393466666665 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2183 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363431343330383338656537366231323162396634393466666665 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit: BPF prog-id=85 op=LOAD Feb 12 19:59:55.303000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003236e0 items=0 ppid=2183 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363431343330383338656537366231323162396634393466666665 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit: BPF prog-id=86 op=LOAD Feb 12 19:59:55.303000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000323728 items=0 ppid=2183 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363431343330383338656537366231323162396634393466666665 Feb 12 19:59:55.303000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:59:55.303000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.303000 audit: BPF prog-id=87 op=LOAD Feb 12 19:59:55.303000 audit[2327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000323b38 items=0 ppid=2183 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134363431343330383338656537366231323162396634393466666665 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit: BPF prog-id=88 op=LOAD Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2217 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238633536323433633337366463303865303963316464326131666237 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2217 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238633536323433633337366463303865303963316464326131666237 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit: BPF prog-id=89 op=LOAD Feb 12 19:59:55.318000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000383db0 items=0 ppid=2217 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238633536323433633337366463303865303963316464326131666237 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.318000 audit: BPF prog-id=90 op=LOAD Feb 12 19:59:55.318000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000383df8 items=0 ppid=2217 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238633536323433633337366463303865303963316464326131666237 Feb 12 19:59:55.319000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:59:55.319000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:59:55.319000 audit: BPF prog-id=91 op=LOAD Feb 12 19:59:55.319000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e2208 items=0 ppid=2217 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:59:55.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238633536323433633337366463303865303963316464326131666237 Feb 12 19:59:55.346045 env[1331]: time="2024-02-12T19:59:55.345992370Z" level=info msg="StartContainer for \"fe6203ed01f874a714f9800e656c5441499879d69197f145f463dbf01a7b4f20\" returns successfully" Feb 12 19:59:55.369740 env[1331]: time="2024-02-12T19:59:55.369679320Z" level=info msg="StartContainer for \"28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362\" returns successfully" Feb 12 19:59:55.426607 env[1331]: time="2024-02-12T19:59:55.426541581Z" level=info msg="StartContainer for \"a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5\" returns successfully" Feb 12 19:59:56.806000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:56.806000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000266ab0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 19:59:56.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:59:56.806000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:56.806000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0011ba040 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 19:59:56.806000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:59:56.846063 kubelet[2091]: I0212 19:59:56.846038 2091 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:57.925681 kernel: kauditd_printk_skb: 628 callbacks suppressed Feb 12 19:59:57.925842 kernel: audit: type=1400 audit(1707767997.900:723): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.900000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.901000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.959256 kernel: audit: type=1400 audit(1707767997.901:724): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.901000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00441c810 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:58.004146 kernel: audit: type=1300 audit(1707767997.901:724): arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c00441c810 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:58.004245 kernel: audit: type=1327 audit(1707767997.901:724): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.900000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00232cb70 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:58.026283 kernel: audit: type=1300 audit(1707767997.900:723): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00232cb70 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:57.900000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:58.066815 kernel: audit: type=1327 audit(1707767997.900:723): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:58.066985 kernel: audit: type=1400 audit(1707767997.924:725): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.924000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.924000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00148b280 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:58.089894 kernel: audit: type=1300 audit(1707767997.924:725): arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c00148b280 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:58.089984 kernel: audit: type=1327 audit(1707767997.924:725): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.924000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.928000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:58.128971 kernel: audit: type=1400 audit(1707767997.928:726): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.928000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c0044de300 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:57.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.932000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.932000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0018546c0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:57.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:57.932000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:59:57.932000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00453f650 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 19:59:57.932000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 19:59:58.143023 kubelet[2091]: E0212 19:59:58.143001 2091 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-996941d352\" not found" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:58.265667 kubelet[2091]: I0212 19:59:58.265561 2091 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-996941d352" Feb 12 19:59:58.713866 kubelet[2091]: I0212 19:59:58.713816 2091 apiserver.go:52] "Watching apiserver" Feb 12 19:59:58.727910 kubelet[2091]: I0212 19:59:58.727869 2091 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:59:58.774891 kubelet[2091]: I0212 19:59:58.774817 2091 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:00:01.122000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:01.122000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00106b300 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:01.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:01.123000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:01.123000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00106b440 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:01.123000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:01.124000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:01.124000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00106b580 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:01.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:01.125000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:01.125000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fb3b80 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:01.125000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:01.503966 systemd[1]: Reloading. Feb 12 20:00:01.574769 /usr/lib/systemd/system-generators/torcx-generator[2423]: time="2024-02-12T20:00:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:00:01.575202 /usr/lib/systemd/system-generators/torcx-generator[2423]: time="2024-02-12T20:00:01Z" level=info msg="torcx already run" Feb 12 20:00:01.677215 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:00:01.677243 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:00:01.695560 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.776000 audit: BPF prog-id=92 op=LOAD Feb 12 20:00:01.776000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit: BPF prog-id=93 op=LOAD Feb 12 20:00:01.777000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit: BPF prog-id=94 op=LOAD Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.777000 audit: BPF prog-id=95 op=LOAD Feb 12 20:00:01.777000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:00:01.777000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit: BPF prog-id=96 op=LOAD Feb 12 20:00:01.778000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit: BPF prog-id=97 op=LOAD Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.778000 audit: BPF prog-id=98 op=LOAD Feb 12 20:00:01.779000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:00:01.779000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.779000 audit: BPF prog-id=99 op=LOAD Feb 12 20:00:01.779000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.780000 audit: BPF prog-id=100 op=LOAD Feb 12 20:00:01.780000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.782000 audit: BPF prog-id=101 op=LOAD Feb 12 20:00:01.782000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.783000 audit: BPF prog-id=102 op=LOAD Feb 12 20:00:01.783000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.785000 audit: BPF prog-id=103 op=LOAD Feb 12 20:00:01.785000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.787000 audit: BPF prog-id=104 op=LOAD Feb 12 20:00:01.787000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:00:01.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.789000 audit: BPF prog-id=105 op=LOAD Feb 12 20:00:01.789000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.790000 audit: BPF prog-id=106 op=LOAD Feb 12 20:00:01.790000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit: BPF prog-id=107 op=LOAD Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.791000 audit: BPF prog-id=108 op=LOAD Feb 12 20:00:01.791000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:00:01.791000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.793000 audit: BPF prog-id=109 op=LOAD Feb 12 20:00:01.793000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit: BPF prog-id=110 op=LOAD Feb 12 20:00:01.796000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit: BPF prog-id=111 op=LOAD Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.796000 audit: BPF prog-id=112 op=LOAD Feb 12 20:00:01.797000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:00:01.797000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:00:01.817372 kubelet[2091]: I0212 20:00:01.816070 2091 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:00:01.816303 systemd[1]: Stopping kubelet.service... Feb 12 20:00:01.835664 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:00:01.836066 systemd[1]: Stopped kubelet.service. Feb 12 20:00:01.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:00:01.839705 systemd[1]: Started kubelet.service. Feb 12 20:00:01.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:00:01.929923 kubelet[2485]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:00:01.929923 kubelet[2485]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:00:01.930555 kubelet[2485]: I0212 20:00:01.929969 2485 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:00:01.931497 kubelet[2485]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:00:01.931497 kubelet[2485]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:00:01.934921 kubelet[2485]: I0212 20:00:01.934898 2485 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:00:01.934921 kubelet[2485]: I0212 20:00:01.934919 2485 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:00:01.935188 kubelet[2485]: I0212 20:00:01.935171 2485 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:00:01.936412 kubelet[2485]: I0212 20:00:01.936390 2485 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:00:01.937187 kubelet[2485]: I0212 20:00:01.937171 2485 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:00:01.941024 kubelet[2485]: I0212 20:00:01.940999 2485 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:00:01.941209 kubelet[2485]: I0212 20:00:01.941189 2485 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:00:01.941347 kubelet[2485]: I0212 20:00:01.941311 2485 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:00:01.941347 kubelet[2485]: I0212 20:00:01.941345 2485 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:00:01.941505 kubelet[2485]: I0212 20:00:01.941370 2485 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:00:01.941505 kubelet[2485]: I0212 20:00:01.941429 2485 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:00:01.946586 kubelet[2485]: I0212 20:00:01.946570 2485 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:00:01.946751 kubelet[2485]: I0212 20:00:01.946739 2485 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:00:01.946888 kubelet[2485]: I0212 20:00:01.946875 2485 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:00:01.946995 kubelet[2485]: I0212 20:00:01.946985 2485 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:00:01.954152 kubelet[2485]: I0212 20:00:01.954134 2485 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:00:01.954756 kubelet[2485]: I0212 20:00:01.954737 2485 server.go:1186] "Started kubelet" Feb 12 20:00:01.956202 kubelet[2485]: E0212 20:00:01.956171 2485 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:00:01.956202 kubelet[2485]: E0212 20:00:01.956196 2485 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:00:01.955000 audit[2485]: AVC avc: denied { mac_admin } for pid=2485 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.955000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:00:01.955000 audit[2485]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e514d0 a1=c000ee2498 a2=c000e514a0 a3=25 items=0 ppid=1 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:01.955000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:00:01.957453 kubelet[2485]: I0212 20:00:01.957439 2485 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:00:01.956000 audit[2485]: AVC avc: denied { mac_admin } for pid=2485 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:01.956000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:00:01.956000 audit[2485]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e3fe20 a1=c000ee24b0 a2=c000e51560 a3=25 items=0 ppid=1 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:01.956000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:00:01.957804 kubelet[2485]: I0212 20:00:01.957792 2485 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:00:01.957890 kubelet[2485]: I0212 20:00:01.957880 2485 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:00:01.961351 kubelet[2485]: I0212 20:00:01.961335 2485 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:00:01.962188 kubelet[2485]: I0212 20:00:01.962171 2485 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:00:01.989043 kubelet[2485]: I0212 20:00:01.985156 2485 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:00:01.999123 kubelet[2485]: I0212 20:00:01.999070 2485 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:00:02.036007 kubelet[2485]: I0212 20:00:02.030309 2485 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:00:02.085182 kubelet[2485]: I0212 20:00:02.085147 2485 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:00:02.085414 kubelet[2485]: I0212 20:00:02.085401 2485 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:00:02.085518 kubelet[2485]: I0212 20:00:02.085509 2485 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:00:02.085663 kubelet[2485]: E0212 20:00:02.085653 2485 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:00:02.100263 kubelet[2485]: I0212 20:00:02.100238 2485 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-996941d352" Feb 12 20:00:02.120173 kubelet[2485]: I0212 20:00:02.120145 2485 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-996941d352" Feb 12 20:00:02.120458 kubelet[2485]: I0212 20:00:02.120442 2485 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-996941d352" Feb 12 20:00:02.149149 kubelet[2485]: I0212 20:00:02.149122 2485 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:00:02.149356 kubelet[2485]: I0212 20:00:02.149342 2485 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:00:02.149466 kubelet[2485]: I0212 20:00:02.149457 2485 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:00:02.149731 kubelet[2485]: I0212 20:00:02.149718 2485 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:00:02.149857 kubelet[2485]: I0212 20:00:02.149846 2485 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:00:02.149931 kubelet[2485]: I0212 20:00:02.149923 2485 policy_none.go:49] "None policy: Start" Feb 12 20:00:02.156818 kubelet[2485]: I0212 20:00:02.155675 2485 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:00:02.156818 kubelet[2485]: I0212 20:00:02.155706 2485 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:00:02.156818 kubelet[2485]: I0212 20:00:02.155875 2485 state_mem.go:75] "Updated machine memory state" Feb 12 20:00:02.160196 kubelet[2485]: I0212 20:00:02.160169 2485 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:00:02.158000 audit[2485]: AVC avc: denied { mac_admin } for pid=2485 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:02.158000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:00:02.158000 audit[2485]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001474b40 a1=c001527500 a2=c001474b10 a3=25 items=0 ppid=1 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:02.158000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:00:02.160570 kubelet[2485]: I0212 20:00:02.160286 2485 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:00:02.162613 kubelet[2485]: I0212 20:00:02.162588 2485 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:00:02.186822 kubelet[2485]: I0212 20:00:02.186783 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:02.186983 kubelet[2485]: I0212 20:00:02.186873 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:02.186983 kubelet[2485]: I0212 20:00:02.186909 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:02.300318 kubelet[2485]: I0212 20:00:02.300270 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300496 kubelet[2485]: I0212 20:00:02.300340 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300496 kubelet[2485]: I0212 20:00:02.300369 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300496 kubelet[2485]: I0212 20:00:02.300408 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300496 kubelet[2485]: I0212 20:00:02.300436 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300496 kubelet[2485]: I0212 20:00:02.300481 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a2d7b63f1098b8b3de3cac50f63cb265-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-996941d352\" (UID: \"a2d7b63f1098b8b3de3cac50f63cb265\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300728 kubelet[2485]: I0212 20:00:02.300509 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a2293855ed1a07723edf941b46af801f-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-996941d352\" (UID: \"a2293855ed1a07723edf941b46af801f\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300728 kubelet[2485]: I0212 20:00:02.300549 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.300728 kubelet[2485]: I0212 20:00:02.300583 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e193df86b7261621d27e628d2da0ce16-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-996941d352\" (UID: \"e193df86b7261621d27e628d2da0ce16\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 20:00:02.954592 kubelet[2485]: I0212 20:00:02.954542 2485 apiserver.go:52] "Watching apiserver" Feb 12 20:00:03.300016 kubelet[2485]: I0212 20:00:03.299977 2485 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:00:03.305822 kubelet[2485]: I0212 20:00:03.305790 2485 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:00:03.561023 kubelet[2485]: E0212 20:00:03.560904 2485 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-996941d352\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" Feb 12 20:00:03.857296 kubelet[2485]: E0212 20:00:03.857165 2485 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-996941d352\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" Feb 12 20:00:04.376184 kubelet[2485]: I0212 20:00:04.376138 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-996941d352" podStartSLOduration=2.376052506 pod.CreationTimestamp="2024-02-12 20:00:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:04.001498384 +0000 UTC m=+2.153134161" watchObservedRunningTime="2024-02-12 20:00:04.376052506 +0000 UTC m=+2.527688283" Feb 12 20:00:04.773186 kubelet[2485]: I0212 20:00:04.773066 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-996941d352" podStartSLOduration=2.773022713 pod.CreationTimestamp="2024-02-12 20:00:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:04.383250062 +0000 UTC m=+2.534885939" watchObservedRunningTime="2024-02-12 20:00:04.773022713 +0000 UTC m=+2.924658590" Feb 12 20:00:06.232461 sudo[1676]: pam_unix(sudo:session): session closed for user root Feb 12 20:00:06.231000 audit[1676]: USER_END pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:00:06.236627 kernel: kauditd_printk_skb: 278 callbacks suppressed Feb 12 20:00:06.236729 kernel: audit: type=1106 audit(1707768006.231:982): pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:00:06.238000 audit[1676]: CRED_DISP pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:00:06.268011 kernel: audit: type=1104 audit(1707768006.238:983): pid=1676 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:00:06.338826 sshd[1673]: pam_unix(sshd:session): session closed for user core Feb 12 20:00:06.339000 audit[1673]: USER_END pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:00:06.341933 systemd[1]: sshd@6-10.200.8.17:22-10.200.12.6:53160.service: Deactivated successfully. Feb 12 20:00:06.342871 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:00:06.343030 systemd[1]: session-9.scope: Consumed 4.024s CPU time. Feb 12 20:00:06.344669 systemd-logind[1316]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:00:06.345720 systemd-logind[1316]: Removed session 9. Feb 12 20:00:06.339000 audit[1673]: CRED_DISP pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:00:06.376299 kernel: audit: type=1106 audit(1707768006.339:984): pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:00:06.376423 kernel: audit: type=1104 audit(1707768006.339:985): pid=1673 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:00:06.376461 kernel: audit: type=1131 audit(1707768006.340:986): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:53160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:00:06.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.17:22-10.200.12.6:53160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:00:07.294706 kubelet[2485]: I0212 20:00:07.294667 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-996941d352" podStartSLOduration=5.294599909 pod.CreationTimestamp="2024-02-12 20:00:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:05.206784707 +0000 UTC m=+3.358420484" watchObservedRunningTime="2024-02-12 20:00:07.294599909 +0000 UTC m=+5.446235786" Feb 12 20:00:13.540000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:00:13.563492 kernel: audit: type=1400 audit(1707768013.540:987): avc: denied { watch } for pid=2358 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:00:13.563636 kernel: audit: type=1300 audit(1707768013.540:987): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001339100 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:13.540000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001339100 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:13.540000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:13.596577 kernel: audit: type=1327 audit(1707768013.540:987): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:14.004929 kubelet[2485]: I0212 20:00:14.004636 2485 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:00:14.005722 env[1331]: time="2024-02-12T20:00:14.005624205Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:00:14.006065 kubelet[2485]: I0212 20:00:14.005907 2485 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:00:14.610213 kubelet[2485]: I0212 20:00:14.609675 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:14.613971 kubelet[2485]: W0212 20:00:14.613899 2485 reflector.go:424] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-996941d352" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-996941d352' and this object Feb 12 20:00:14.613971 kubelet[2485]: E0212 20:00:14.613942 2485 reflector.go:140] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-996941d352" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-996941d352' and this object Feb 12 20:00:14.614225 kubelet[2485]: W0212 20:00:14.614006 2485 reflector.go:424] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-996941d352" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-996941d352' and this object Feb 12 20:00:14.614225 kubelet[2485]: E0212 20:00:14.614020 2485 reflector.go:140] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-996941d352" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-996941d352' and this object Feb 12 20:00:14.616292 systemd[1]: Created slice kubepods-besteffort-pod79cdd4c8_0115_41d8_9057_837d4ed3a865.slice. Feb 12 20:00:14.771082 kubelet[2485]: I0212 20:00:14.771047 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/79cdd4c8-0115-41d8-9057-837d4ed3a865-kube-proxy\") pod \"kube-proxy-24hq9\" (UID: \"79cdd4c8-0115-41d8-9057-837d4ed3a865\") " pod="kube-system/kube-proxy-24hq9" Feb 12 20:00:14.771082 kubelet[2485]: I0212 20:00:14.771092 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/79cdd4c8-0115-41d8-9057-837d4ed3a865-lib-modules\") pod \"kube-proxy-24hq9\" (UID: \"79cdd4c8-0115-41d8-9057-837d4ed3a865\") " pod="kube-system/kube-proxy-24hq9" Feb 12 20:00:14.771323 kubelet[2485]: I0212 20:00:14.771120 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/79cdd4c8-0115-41d8-9057-837d4ed3a865-xtables-lock\") pod \"kube-proxy-24hq9\" (UID: \"79cdd4c8-0115-41d8-9057-837d4ed3a865\") " pod="kube-system/kube-proxy-24hq9" Feb 12 20:00:14.771323 kubelet[2485]: I0212 20:00:14.771146 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4vkk6\" (UniqueName: \"kubernetes.io/projected/79cdd4c8-0115-41d8-9057-837d4ed3a865-kube-api-access-4vkk6\") pod \"kube-proxy-24hq9\" (UID: \"79cdd4c8-0115-41d8-9057-837d4ed3a865\") " pod="kube-system/kube-proxy-24hq9" Feb 12 20:00:14.972448 kubelet[2485]: I0212 20:00:14.972331 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:14.979093 systemd[1]: Created slice kubepods-besteffort-podef8011d2_f615_4f1e_b6ab_cbf21626d54a.slice. Feb 12 20:00:15.173650 kubelet[2485]: I0212 20:00:15.173601 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ef8011d2-f615-4f1e-b6ab-cbf21626d54a-var-lib-calico\") pod \"tigera-operator-cfc98749c-nwgrp\" (UID: \"ef8011d2-f615-4f1e-b6ab-cbf21626d54a\") " pod="tigera-operator/tigera-operator-cfc98749c-nwgrp" Feb 12 20:00:15.174081 kubelet[2485]: I0212 20:00:15.173674 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zwmv8\" (UniqueName: \"kubernetes.io/projected/ef8011d2-f615-4f1e-b6ab-cbf21626d54a-kube-api-access-zwmv8\") pod \"tigera-operator-cfc98749c-nwgrp\" (UID: \"ef8011d2-f615-4f1e-b6ab-cbf21626d54a\") " pod="tigera-operator/tigera-operator-cfc98749c-nwgrp" Feb 12 20:00:15.583817 env[1331]: time="2024-02-12T20:00:15.583761907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-nwgrp,Uid:ef8011d2-f615-4f1e-b6ab-cbf21626d54a,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:00:15.623868 env[1331]: time="2024-02-12T20:00:15.623799170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:15.624063 env[1331]: time="2024-02-12T20:00:15.623839970Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:15.624063 env[1331]: time="2024-02-12T20:00:15.623865171Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:15.624208 env[1331]: time="2024-02-12T20:00:15.624063674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95 pid=2590 runtime=io.containerd.runc.v2 Feb 12 20:00:15.644940 systemd[1]: Started cri-containerd-c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95.scope. Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671320 kernel: audit: type=1400 audit(1707768015.657:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.697527 kernel: audit: type=1400 audit(1707768015.657:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.697610 kernel: audit: type=1400 audit(1707768015.657:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.710543 kernel: audit: type=1400 audit(1707768015.657:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.710624 kernel: audit: type=1400 audit(1707768015.657:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.737423 kernel: audit: type=1400 audit(1707768015.657:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.751584 kernel: audit: type=1400 audit(1707768015.657:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.670000 audit: BPF prog-id=113 op=LOAD Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=2590 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331393832666235336562393233633836623236393063303037663961 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=2590 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331393832666235336562393233633836623236393063303037663961 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit: BPF prog-id=114 op=LOAD Feb 12 20:00:15.671000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c0003d41c0 items=0 ppid=2590 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331393832666235336562393233633836623236393063303037663961 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit: BPF prog-id=115 op=LOAD Feb 12 20:00:15.671000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c0003d4208 items=0 ppid=2590 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331393832666235336562393233633836623236393063303037663961 Feb 12 20:00:15.671000 audit: BPF prog-id=115 op=UNLOAD Feb 12 20:00:15.671000 audit: BPF prog-id=114 op=UNLOAD Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:15.671000 audit: BPF prog-id=116 op=LOAD Feb 12 20:00:15.671000 audit[2600]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c0003d4618 items=0 ppid=2590 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331393832666235336562393233633836623236393063303037663961 Feb 12 20:00:15.766509 env[1331]: time="2024-02-12T20:00:15.766472730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-nwgrp,Uid:ef8011d2-f615-4f1e-b6ab-cbf21626d54a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95\"" Feb 12 20:00:15.768303 env[1331]: time="2024-02-12T20:00:15.768270160Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:00:15.881888 kubelet[2485]: E0212 20:00:15.879161 2485 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 12 20:00:15.881888 kubelet[2485]: E0212 20:00:15.879200 2485 projected.go:198] Error preparing data for projected volume kube-api-access-4vkk6 for pod kube-system/kube-proxy-24hq9: failed to sync configmap cache: timed out waiting for the condition Feb 12 20:00:15.881888 kubelet[2485]: E0212 20:00:15.879303 2485 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/79cdd4c8-0115-41d8-9057-837d4ed3a865-kube-api-access-4vkk6 podName:79cdd4c8-0115-41d8-9057-837d4ed3a865 nodeName:}" failed. No retries permitted until 2024-02-12 20:00:16.379278296 +0000 UTC m=+14.530914373 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4vkk6" (UniqueName: "kubernetes.io/projected/79cdd4c8-0115-41d8-9057-837d4ed3a865-kube-api-access-4vkk6") pod "kube-proxy-24hq9" (UID: "79cdd4c8-0115-41d8-9057-837d4ed3a865") : failed to sync configmap cache: timed out waiting for the condition Feb 12 20:00:16.428838 env[1331]: time="2024-02-12T20:00:16.428785723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-24hq9,Uid:79cdd4c8-0115-41d8-9057-837d4ed3a865,Namespace:kube-system,Attempt:0,}" Feb 12 20:00:16.475873 env[1331]: time="2024-02-12T20:00:16.475792583Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:16.476129 env[1331]: time="2024-02-12T20:00:16.475841983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:16.476129 env[1331]: time="2024-02-12T20:00:16.475854884Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:16.476129 env[1331]: time="2024-02-12T20:00:16.475981586Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69a6a834b3b14054a8ea1fbd8cc04f9839d5316c441ee05981c1a7dc567f52b2 pid=2631 runtime=io.containerd.runc.v2 Feb 12 20:00:16.498852 systemd[1]: Started cri-containerd-69a6a834b3b14054a8ea1fbd8cc04f9839d5316c441ee05981c1a7dc567f52b2.scope. Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit: BPF prog-id=117 op=LOAD Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=2631 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613661383334623362313430353461386561316662643863633034 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=2631 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613661383334623362313430353461386561316662643863633034 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit: BPF prog-id=118 op=LOAD Feb 12 20:00:16.511000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002179d8 a2=78 a3=c0001175b0 items=0 ppid=2631 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613661383334623362313430353461386561316662643863633034 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.511000 audit: BPF prog-id=119 op=LOAD Feb 12 20:00:16.511000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000217770 a2=78 a3=c0001175f8 items=0 ppid=2631 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613661383334623362313430353461386561316662643863633034 Feb 12 20:00:16.511000 audit: BPF prog-id=119 op=UNLOAD Feb 12 20:00:16.512000 audit: BPF prog-id=118 op=UNLOAD Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.512000 audit: BPF prog-id=120 op=LOAD Feb 12 20:00:16.512000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000217c30 a2=78 a3=c000117a08 items=0 ppid=2631 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639613661383334623362313430353461386561316662643863633034 Feb 12 20:00:16.524877 env[1331]: time="2024-02-12T20:00:16.524830175Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-24hq9,Uid:79cdd4c8-0115-41d8-9057-837d4ed3a865,Namespace:kube-system,Attempt:0,} returns sandbox id \"69a6a834b3b14054a8ea1fbd8cc04f9839d5316c441ee05981c1a7dc567f52b2\"" Feb 12 20:00:16.528600 env[1331]: time="2024-02-12T20:00:16.528564635Z" level=info msg="CreateContainer within sandbox \"69a6a834b3b14054a8ea1fbd8cc04f9839d5316c441ee05981c1a7dc567f52b2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:00:16.583518 env[1331]: time="2024-02-12T20:00:16.583458022Z" level=info msg="CreateContainer within sandbox \"69a6a834b3b14054a8ea1fbd8cc04f9839d5316c441ee05981c1a7dc567f52b2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5028dd2643e0614d00e86936e25f1275656d38318515a5230ed1ba06a2592da5\"" Feb 12 20:00:16.584710 env[1331]: time="2024-02-12T20:00:16.584679942Z" level=info msg="StartContainer for \"5028dd2643e0614d00e86936e25f1275656d38318515a5230ed1ba06a2592da5\"" Feb 12 20:00:16.604550 systemd[1]: Started cri-containerd-5028dd2643e0614d00e86936e25f1275656d38318515a5230ed1ba06a2592da5.scope. Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f86f81d9c38 items=0 ppid=2631 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530323864643236343365303631346430306538363933366532356631 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit: BPF prog-id=121 op=LOAD Feb 12 20:00:16.620000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00027dbb8 items=0 ppid=2631 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530323864643236343365303631346430306538363933366532356631 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.620000 audit: BPF prog-id=122 op=LOAD Feb 12 20:00:16.620000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00027dc08 items=0 ppid=2631 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530323864643236343365303631346430306538363933366532356631 Feb 12 20:00:16.620000 audit: BPF prog-id=122 op=UNLOAD Feb 12 20:00:16.621000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:16.621000 audit: BPF prog-id=123 op=LOAD Feb 12 20:00:16.621000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00027dc98 items=0 ppid=2631 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530323864643236343365303631346430306538363933366532356631 Feb 12 20:00:16.640146 env[1331]: time="2024-02-12T20:00:16.640101438Z" level=info msg="StartContainer for \"5028dd2643e0614d00e86936e25f1275656d38318515a5230ed1ba06a2592da5\" returns successfully" Feb 12 20:00:16.686000 audit[2719]: NETFILTER_CFG table=mangle:63 family=10 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.686000 audit[2719]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc749a670 a2=0 a3=7ffcc749a65c items=0 ppid=2681 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:00:16.688000 audit[2720]: NETFILTER_CFG table=mangle:64 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.688000 audit[2720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe21a61470 a2=0 a3=7ffe21a6145c items=0 ppid=2681 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:00:16.700000 audit[2723]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.700000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4bc83c00 a2=0 a3=7ffc4bc83bec items=0 ppid=2681 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:00:16.701000 audit[2724]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.701000 audit[2724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff599659a0 a2=0 a3=7fff5996598c items=0 ppid=2681 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:00:16.702000 audit[2725]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.702000 audit[2725]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe02b89970 a2=0 a3=7ffe02b8995c items=0 ppid=2681 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:00:16.702000 audit[2726]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.702000 audit[2726]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff89c604c0 a2=0 a3=7fff89c604ac items=0 ppid=2681 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:00:16.796000 audit[2727]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.796000 audit[2727]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffffddee680 a2=0 a3=7ffffddee66c items=0 ppid=2681 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:00:16.799000 audit[2729]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.799000 audit[2729]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe9bfff920 a2=0 a3=7ffe9bfff90c items=0 ppid=2681 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.799000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:00:16.802000 audit[2732]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.802000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe247e1ec0 a2=0 a3=7ffe247e1eac items=0 ppid=2681 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:00:16.804000 audit[2733]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.804000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3741b240 a2=0 a3=7ffe3741b22c items=0 ppid=2681 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.804000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:00:16.806000 audit[2735]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.806000 audit[2735]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff674f82a0 a2=0 a3=7fff674f828c items=0 ppid=2681 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:00:16.807000 audit[2736]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.807000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc21d9d7f0 a2=0 a3=7ffc21d9d7dc items=0 ppid=2681 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.807000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:00:16.810000 audit[2738]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.810000 audit[2738]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeace46690 a2=0 a3=7ffeace4667c items=0 ppid=2681 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.810000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:00:16.814000 audit[2741]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.814000 audit[2741]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdb1244c30 a2=0 a3=7ffdb1244c1c items=0 ppid=2681 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:00:16.815000 audit[2742]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.815000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd82a61400 a2=0 a3=7ffd82a613ec items=0 ppid=2681 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:00:16.818000 audit[2744]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.818000 audit[2744]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed45b33f0 a2=0 a3=7ffed45b33dc items=0 ppid=2681 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:00:16.819000 audit[2745]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.819000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9ef06830 a2=0 a3=7ffe9ef0681c items=0 ppid=2681 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.819000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:00:16.830000 audit[2747]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.830000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff85d613e0 a2=0 a3=7fff85d613cc items=0 ppid=2681 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.830000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:00:16.833000 audit[2750]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.833000 audit[2750]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc26a56c0 a2=0 a3=7ffcc26a56ac items=0 ppid=2681 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.833000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:00:16.837000 audit[2753]: NETFILTER_CFG table=filter:82 family=2 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.837000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeac95f600 a2=0 a3=7ffeac95f5ec items=0 ppid=2681 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:00:16.838000 audit[2754]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.838000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd64306570 a2=0 a3=7ffd6430655c items=0 ppid=2681 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:00:16.840000 audit[2756]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.840000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff5d845b00 a2=0 a3=7fff5d845aec items=0 ppid=2681 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:00:16.844000 audit[2759]: NETFILTER_CFG table=nat:85 family=2 entries=1 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:00:16.844000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff1ce7d050 a2=0 a3=7fff1ce7d03c items=0 ppid=2681 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:00:16.879000 audit[2763]: NETFILTER_CFG table=filter:86 family=2 entries=6 op=nft_register_rule pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:16.879000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff3a1f0300 a2=0 a3=7fff3a1f02ec items=0 ppid=2681 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:16.899000 audit[2763]: NETFILTER_CFG table=nat:87 family=2 entries=17 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:16.899000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff3a1f0300 a2=0 a3=7fff3a1f02ec items=0 ppid=2681 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.899000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:16.904000 audit[2767]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.904000 audit[2767]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc955fe00 a2=0 a3=7fffc955fdec items=0 ppid=2681 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:00:16.912000 audit[2769]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.912000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc12bb2020 a2=0 a3=7ffc12bb200c items=0 ppid=2681 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:00:16.915000 audit[2772]: NETFILTER_CFG table=filter:90 family=10 entries=2 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.915000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc35a9f640 a2=0 a3=7ffc35a9f62c items=0 ppid=2681 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:00:16.917000 audit[2773]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.917000 audit[2773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccb4278a0 a2=0 a3=7ffccb42788c items=0 ppid=2681 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:00:16.919000 audit[2775]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.919000 audit[2775]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff78866810 a2=0 a3=7fff788667fc items=0 ppid=2681 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:00:16.920000 audit[2776]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.920000 audit[2776]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd8c880d0 a2=0 a3=7fffd8c880bc items=0 ppid=2681 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:00:16.923000 audit[2778]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.923000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff0a78f440 a2=0 a3=7fff0a78f42c items=0 ppid=2681 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:00:16.926000 audit[2781]: NETFILTER_CFG table=filter:95 family=10 entries=2 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.926000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff30606a60 a2=0 a3=7fff30606a4c items=0 ppid=2681 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:00:16.927000 audit[2782]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.927000 audit[2782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdca823ed0 a2=0 a3=7ffdca823ebc items=0 ppid=2681 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.927000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:00:16.934000 audit[2784]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.934000 audit[2784]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc985eb530 a2=0 a3=7ffc985eb51c items=0 ppid=2681 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:00:16.936000 audit[2785]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.936000 audit[2785]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff39a72e0 a2=0 a3=7ffff39a72cc items=0 ppid=2681 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.936000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:00:16.940000 audit[2787]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.940000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf5a34fa0 a2=0 a3=7ffdf5a34f8c items=0 ppid=2681 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:00:16.946000 audit[2790]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.946000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe65c1fdd0 a2=0 a3=7ffe65c1fdbc items=0 ppid=2681 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:00:16.950000 audit[2793]: NETFILTER_CFG table=filter:101 family=10 entries=1 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.950000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5b13a4c0 a2=0 a3=7fff5b13a4ac items=0 ppid=2681 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.950000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:00:16.952000 audit[2794]: NETFILTER_CFG table=nat:102 family=10 entries=1 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.952000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd674f7760 a2=0 a3=7ffd674f774c items=0 ppid=2681 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:00:16.954000 audit[2796]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.954000 audit[2796]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdbf3c3a10 a2=0 a3=7ffdbf3c39fc items=0 ppid=2681 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:00:16.958000 audit[2799]: NETFILTER_CFG table=nat:104 family=10 entries=2 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:00:16.958000 audit[2799]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff8e44eb90 a2=0 a3=7fff8e44eb7c items=0 ppid=2681 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:00:16.963000 audit[2803]: NETFILTER_CFG table=filter:105 family=10 entries=3 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:00:16.963000 audit[2803]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe1f8b7010 a2=0 a3=7ffe1f8b6ffc items=0 ppid=2681 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.963000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:16.963000 audit[2803]: NETFILTER_CFG table=nat:106 family=10 entries=10 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:00:16.963000 audit[2803]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe1f8b7010 a2=0 a3=7ffe1f8b6ffc items=0 ppid=2681 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:16.963000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:17.140130 kubelet[2485]: I0212 20:00:17.139840 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-24hq9" podStartSLOduration=3.139804861 pod.CreationTimestamp="2024-02-12 20:00:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:17.139650058 +0000 UTC m=+15.291285835" watchObservedRunningTime="2024-02-12 20:00:17.139804861 +0000 UTC m=+15.291440638" Feb 12 20:00:18.358708 env[1331]: time="2024-02-12T20:00:18.358653373Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:18.368857 env[1331]: time="2024-02-12T20:00:18.368819630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:18.372637 env[1331]: time="2024-02-12T20:00:18.372607789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:18.378305 env[1331]: time="2024-02-12T20:00:18.378275976Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:18.378816 env[1331]: time="2024-02-12T20:00:18.378785984Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 20:00:18.382571 env[1331]: time="2024-02-12T20:00:18.382547742Z" level=info msg="CreateContainer within sandbox \"c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:00:18.413647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2253542539.mount: Deactivated successfully. Feb 12 20:00:18.429429 env[1331]: time="2024-02-12T20:00:18.429389364Z" level=info msg="CreateContainer within sandbox \"c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac\"" Feb 12 20:00:18.431735 env[1331]: time="2024-02-12T20:00:18.430017074Z" level=info msg="StartContainer for \"ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac\"" Feb 12 20:00:18.454033 systemd[1]: Started cri-containerd-ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac.scope. Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit: BPF prog-id=124 op=LOAD Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2590 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563626136386130396137613634383735613931653833373633373831 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2590 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563626136386130396137613634383735613931653833373633373831 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit: BPF prog-id=125 op=LOAD Feb 12 20:00:18.469000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000282ff0 items=0 ppid=2590 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563626136386130396137613634383735613931653833373633373831 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit: BPF prog-id=126 op=LOAD Feb 12 20:00:18.469000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000283038 items=0 ppid=2590 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563626136386130396137613634383735613931653833373633373831 Feb 12 20:00:18.469000 audit: BPF prog-id=126 op=UNLOAD Feb 12 20:00:18.469000 audit: BPF prog-id=125 op=UNLOAD Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { perfmon } for pid=2811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit[2811]: AVC avc: denied { bpf } for pid=2811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:18.469000 audit: BPF prog-id=127 op=LOAD Feb 12 20:00:18.469000 audit[2811]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000283448 items=0 ppid=2590 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:18.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563626136386130396137613634383735613931653833373633373831 Feb 12 20:00:18.492131 env[1331]: time="2024-02-12T20:00:18.492092632Z" level=info msg="StartContainer for \"ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac\" returns successfully" Feb 12 20:00:19.408387 systemd[1]: run-containerd-runc-k8s.io-ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac-runc.PS4d8T.mount: Deactivated successfully. Feb 12 20:00:20.466000 audit[2868]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.475269 kernel: kauditd_printk_skb: 339 callbacks suppressed Feb 12 20:00:20.475371 kernel: audit: type=1325 audit(1707768020.466:1092): table=filter:107 family=2 entries=13 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.484247 kernel: audit: type=1300 audit(1707768020.466:1092): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffb80727f0 a2=0 a3=7fffb80727dc items=0 ppid=2681 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.466000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffb80727f0 a2=0 a3=7fffb80727dc items=0 ppid=2681 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.503253 kernel: audit: type=1327 audit(1707768020.466:1092): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.467000 audit[2868]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.523588 kernel: audit: type=1325 audit(1707768020.467:1093): table=nat:108 family=2 entries=20 op=nft_register_rule pid=2868 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.523652 kernel: audit: type=1300 audit(1707768020.467:1093): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffb80727f0 a2=0 a3=7fffb80727dc items=0 ppid=2681 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.467000 audit[2868]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffb80727f0 a2=0 a3=7fffb80727dc items=0 ppid=2681 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.544437 kernel: audit: type=1327 audit(1707768020.467:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.605810 kubelet[2485]: I0212 20:00:20.605774 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-nwgrp" podStartSLOduration=-9.223372030249052e+09 pod.CreationTimestamp="2024-02-12 20:00:14 +0000 UTC" firstStartedPulling="2024-02-12 20:00:15.767643149 +0000 UTC m=+13.919278926" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:19.143784835 +0000 UTC m=+17.295420712" watchObservedRunningTime="2024-02-12 20:00:20.605723772 +0000 UTC m=+18.757359549" Feb 12 20:00:20.606664 kubelet[2485]: I0212 20:00:20.606636 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:20.612963 systemd[1]: Created slice kubepods-besteffort-podfe8e66ff_384c_48d9_8d60_155cb33d8bca.slice. Feb 12 20:00:20.613783 kubelet[2485]: I0212 20:00:20.613759 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe8e66ff-384c-48d9-8d60-155cb33d8bca-tigera-ca-bundle\") pod \"calico-typha-5c67d448f8-ghbx4\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " pod="calico-system/calico-typha-5c67d448f8-ghbx4" Feb 12 20:00:20.613948 kubelet[2485]: I0212 20:00:20.613932 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe8e66ff-384c-48d9-8d60-155cb33d8bca-typha-certs\") pod \"calico-typha-5c67d448f8-ghbx4\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " pod="calico-system/calico-typha-5c67d448f8-ghbx4" Feb 12 20:00:20.614109 kubelet[2485]: I0212 20:00:20.614094 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jg5h6\" (UniqueName: \"kubernetes.io/projected/fe8e66ff-384c-48d9-8d60-155cb33d8bca-kube-api-access-jg5h6\") pod \"calico-typha-5c67d448f8-ghbx4\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " pod="calico-system/calico-typha-5c67d448f8-ghbx4" Feb 12 20:00:20.682000 audit[2894]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.698256 kernel: audit: type=1325 audit(1707768020.682:1094): table=filter:109 family=2 entries=14 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.682000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffedd035410 a2=0 a3=7ffedd0353fc items=0 ppid=2681 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.719270 kernel: audit: type=1300 audit(1707768020.682:1094): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffedd035410 a2=0 a3=7ffedd0353fc items=0 ppid=2681 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.738247 kernel: audit: type=1327 audit(1707768020.682:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.682000 audit[2894]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.750248 kernel: audit: type=1325 audit(1707768020.682:1095): table=nat:110 family=2 entries=20 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:20.682000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffedd035410 a2=0 a3=7ffedd0353fc items=0 ppid=2681 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:20.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:20.757464 kubelet[2485]: I0212 20:00:20.757433 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:20.773350 systemd[1]: Created slice kubepods-besteffort-pod1e44c71e_f294_472e_bcbc_f44f1d5b6af4.slice. Feb 12 20:00:20.867111 kubelet[2485]: I0212 20:00:20.867077 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:20.867420 kubelet[2485]: E0212 20:00:20.867395 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:20.916763 env[1331]: time="2024-02-12T20:00:20.916701255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c67d448f8-ghbx4,Uid:fe8e66ff-384c-48d9-8d60-155cb33d8bca,Namespace:calico-system,Attempt:0,}" Feb 12 20:00:20.919528 kubelet[2485]: I0212 20:00:20.919500 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-lib-calico\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919644 kubelet[2485]: I0212 20:00:20.919563 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-bin-dir\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919644 kubelet[2485]: I0212 20:00:20.919634 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-lib-modules\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919745 kubelet[2485]: I0212 20:00:20.919668 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-tigera-ca-bundle\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919745 kubelet[2485]: I0212 20:00:20.919718 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-run-calico\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919834 kubelet[2485]: I0212 20:00:20.919753 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2trlp\" (UniqueName: \"kubernetes.io/projected/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-kube-api-access-2trlp\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919900 kubelet[2485]: I0212 20:00:20.919886 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-policysync\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.919952 kubelet[2485]: I0212 20:00:20.919928 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-flexvol-driver-host\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.920679 kubelet[2485]: I0212 20:00:20.920650 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-xtables-lock\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.921382 kubelet[2485]: I0212 20:00:20.921359 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-node-certs\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.921816 kubelet[2485]: I0212 20:00:20.921514 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-net-dir\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.922563 kubelet[2485]: I0212 20:00:20.922536 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-log-dir\") pod \"calico-node-x5px4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " pod="calico-system/calico-node-x5px4" Feb 12 20:00:20.962787 env[1331]: time="2024-02-12T20:00:20.962560031Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:20.962787 env[1331]: time="2024-02-12T20:00:20.962606331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:20.962787 env[1331]: time="2024-02-12T20:00:20.962621432Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:20.963009 env[1331]: time="2024-02-12T20:00:20.962807634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98 pid=2904 runtime=io.containerd.runc.v2 Feb 12 20:00:20.992197 systemd[1]: Started cri-containerd-f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98.scope. Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.007000 audit: BPF prog-id=128 op=LOAD Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2904 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643963653633343761636230636561636261656466373562656235 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2904 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643963653633343761636230636561636261656466373562656235 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.008000 audit: BPF prog-id=129 op=LOAD Feb 12 20:00:21.008000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024eb0 items=0 ppid=2904 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643963653633343761636230636561636261656466373562656235 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.009000 audit: BPF prog-id=130 op=LOAD Feb 12 20:00:21.009000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ef8 items=0 ppid=2904 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643963653633343761636230636561636261656466373562656235 Feb 12 20:00:21.010000 audit: BPF prog-id=130 op=UNLOAD Feb 12 20:00:21.010000 audit: BPF prog-id=129 op=UNLOAD Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { perfmon } for pid=2912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit[2912]: AVC avc: denied { bpf } for pid=2912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.010000 audit: BPF prog-id=131 op=LOAD Feb 12 20:00:21.010000 audit[2912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025308 items=0 ppid=2904 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638643963653633343761636230636561636261656466373562656235 Feb 12 20:00:21.024577 kubelet[2485]: I0212 20:00:21.023490 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/dec3207f-864b-4d9d-b98a-dcf25643ac17-registration-dir\") pod \"csi-node-driver-f9rqg\" (UID: \"dec3207f-864b-4d9d-b98a-dcf25643ac17\") " pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:00:21.024577 kubelet[2485]: I0212 20:00:21.023549 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/dec3207f-864b-4d9d-b98a-dcf25643ac17-kubelet-dir\") pod \"csi-node-driver-f9rqg\" (UID: \"dec3207f-864b-4d9d-b98a-dcf25643ac17\") " pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:00:21.024577 kubelet[2485]: I0212 20:00:21.023608 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjvqd\" (UniqueName: \"kubernetes.io/projected/dec3207f-864b-4d9d-b98a-dcf25643ac17-kube-api-access-gjvqd\") pod \"csi-node-driver-f9rqg\" (UID: \"dec3207f-864b-4d9d-b98a-dcf25643ac17\") " pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:00:21.024577 kubelet[2485]: I0212 20:00:21.023681 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/dec3207f-864b-4d9d-b98a-dcf25643ac17-varrun\") pod \"csi-node-driver-f9rqg\" (UID: \"dec3207f-864b-4d9d-b98a-dcf25643ac17\") " pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:00:21.024577 kubelet[2485]: I0212 20:00:21.023765 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/dec3207f-864b-4d9d-b98a-dcf25643ac17-socket-dir\") pod \"csi-node-driver-f9rqg\" (UID: \"dec3207f-864b-4d9d-b98a-dcf25643ac17\") " pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:00:21.025490 kubelet[2485]: E0212 20:00:21.025473 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.025624 kubelet[2485]: W0212 20:00:21.025608 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.025735 kubelet[2485]: E0212 20:00:21.025721 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.027831 kubelet[2485]: E0212 20:00:21.027811 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.027831 kubelet[2485]: W0212 20:00:21.027830 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.027986 kubelet[2485]: E0212 20:00:21.027853 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.029554 kubelet[2485]: E0212 20:00:21.029528 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.029554 kubelet[2485]: W0212 20:00:21.029546 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.029699 kubelet[2485]: E0212 20:00:21.029654 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.029809 kubelet[2485]: E0212 20:00:21.029786 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.029809 kubelet[2485]: W0212 20:00:21.029809 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.029941 kubelet[2485]: E0212 20:00:21.029896 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.030040 kubelet[2485]: E0212 20:00:21.030024 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.030108 kubelet[2485]: W0212 20:00:21.030044 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.030168 kubelet[2485]: E0212 20:00:21.030131 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.030289 kubelet[2485]: E0212 20:00:21.030274 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.030289 kubelet[2485]: W0212 20:00:21.030288 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.030421 kubelet[2485]: E0212 20:00:21.030379 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.030524 kubelet[2485]: E0212 20:00:21.030510 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.030524 kubelet[2485]: W0212 20:00:21.030524 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.030652 kubelet[2485]: E0212 20:00:21.030611 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.030748 kubelet[2485]: E0212 20:00:21.030734 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.030820 kubelet[2485]: W0212 20:00:21.030748 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.030887 kubelet[2485]: E0212 20:00:21.030832 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.030959 kubelet[2485]: E0212 20:00:21.030946 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.031028 kubelet[2485]: W0212 20:00:21.030961 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.031095 kubelet[2485]: E0212 20:00:21.031046 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.031179 kubelet[2485]: E0212 20:00:21.031164 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.031254 kubelet[2485]: W0212 20:00:21.031180 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.033278 kubelet[2485]: E0212 20:00:21.033259 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.033441 kubelet[2485]: E0212 20:00:21.033427 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.033512 kubelet[2485]: W0212 20:00:21.033441 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.033575 kubelet[2485]: E0212 20:00:21.033521 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.033659 kubelet[2485]: E0212 20:00:21.033645 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.033731 kubelet[2485]: W0212 20:00:21.033660 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.033791 kubelet[2485]: E0212 20:00:21.033738 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.033862 kubelet[2485]: E0212 20:00:21.033847 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.033917 kubelet[2485]: W0212 20:00:21.033862 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.033969 kubelet[2485]: E0212 20:00:21.033942 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.034077 kubelet[2485]: E0212 20:00:21.034064 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.034133 kubelet[2485]: W0212 20:00:21.034078 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.034183 kubelet[2485]: E0212 20:00:21.034165 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.034316 kubelet[2485]: E0212 20:00:21.034302 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.034378 kubelet[2485]: W0212 20:00:21.034316 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.034450 kubelet[2485]: E0212 20:00:21.034438 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.034600 kubelet[2485]: E0212 20:00:21.034585 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.034662 kubelet[2485]: W0212 20:00:21.034599 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.034736 kubelet[2485]: E0212 20:00:21.034722 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.034869 kubelet[2485]: E0212 20:00:21.034856 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.034934 kubelet[2485]: W0212 20:00:21.034870 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.034934 kubelet[2485]: E0212 20:00:21.034888 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.035119 kubelet[2485]: E0212 20:00:21.035104 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.035119 kubelet[2485]: W0212 20:00:21.035119 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.035252 kubelet[2485]: E0212 20:00:21.035194 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.035351 kubelet[2485]: E0212 20:00:21.035337 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.035408 kubelet[2485]: W0212 20:00:21.035351 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.035459 kubelet[2485]: E0212 20:00:21.035433 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.035566 kubelet[2485]: E0212 20:00:21.035552 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.035625 kubelet[2485]: W0212 20:00:21.035567 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.035676 kubelet[2485]: E0212 20:00:21.035669 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.035788 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.037247 kubelet[2485]: W0212 20:00:21.035798 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.035892 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.035995 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.037247 kubelet[2485]: W0212 20:00:21.036002 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.036018 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.036181 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.037247 kubelet[2485]: W0212 20:00:21.036189 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.037247 kubelet[2485]: E0212 20:00:21.036203 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.061121 env[1331]: time="2024-02-12T20:00:21.061078763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5c67d448f8-ghbx4,Uid:fe8e66ff-384c-48d9-8d60-155cb33d8bca,Namespace:calico-system,Attempt:0,} returns sandbox id \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\"" Feb 12 20:00:21.062665 env[1331]: time="2024-02-12T20:00:21.062634886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124194 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.125859 kubelet[2485]: W0212 20:00:21.124214 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124253 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124488 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.125859 kubelet[2485]: W0212 20:00:21.124497 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124514 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124715 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.125859 kubelet[2485]: W0212 20:00:21.124723 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124738 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.125859 kubelet[2485]: E0212 20:00:21.124917 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.126363 kubelet[2485]: W0212 20:00:21.124924 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.124938 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.125191 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.126363 kubelet[2485]: W0212 20:00:21.125199 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.125215 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.125410 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.126363 kubelet[2485]: W0212 20:00:21.125419 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.125435 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.126363 kubelet[2485]: E0212 20:00:21.125610 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.126363 kubelet[2485]: W0212 20:00:21.125618 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.126740 kubelet[2485]: E0212 20:00:21.125681 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.126740 kubelet[2485]: E0212 20:00:21.125791 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.126740 kubelet[2485]: W0212 20:00:21.125799 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.126869 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.126992 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.127745 kubelet[2485]: W0212 20:00:21.127000 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.127073 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.127167 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.127745 kubelet[2485]: W0212 20:00:21.127173 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.127255 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.127352 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.127745 kubelet[2485]: W0212 20:00:21.127359 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.127745 kubelet[2485]: E0212 20:00:21.127418 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.128160 kubelet[2485]: E0212 20:00:21.127509 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.128160 kubelet[2485]: W0212 20:00:21.127515 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.128160 kubelet[2485]: E0212 20:00:21.127581 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.128160 kubelet[2485]: E0212 20:00:21.127670 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.128160 kubelet[2485]: W0212 20:00:21.127677 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.128160 kubelet[2485]: E0212 20:00:21.127693 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128544 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.129084 kubelet[2485]: W0212 20:00:21.128556 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128629 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128734 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.129084 kubelet[2485]: W0212 20:00:21.128740 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128799 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128882 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.129084 kubelet[2485]: W0212 20:00:21.128888 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.128944 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.129084 kubelet[2485]: E0212 20:00:21.129023 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.129570 kubelet[2485]: W0212 20:00:21.129029 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.130076 kubelet[2485]: E0212 20:00:21.129633 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.130076 kubelet[2485]: E0212 20:00:21.129747 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.130076 kubelet[2485]: W0212 20:00:21.129754 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.130076 kubelet[2485]: E0212 20:00:21.129841 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.130076 kubelet[2485]: E0212 20:00:21.129936 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.130076 kubelet[2485]: W0212 20:00:21.129943 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.130076 kubelet[2485]: E0212 20:00:21.130002 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.130823 kubelet[2485]: E0212 20:00:21.130566 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.130823 kubelet[2485]: W0212 20:00:21.130579 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.130823 kubelet[2485]: E0212 20:00:21.130660 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.131095 kubelet[2485]: E0212 20:00:21.131021 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.131095 kubelet[2485]: W0212 20:00:21.131031 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.131352 kubelet[2485]: E0212 20:00:21.131204 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.131546 kubelet[2485]: E0212 20:00:21.131537 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.131619 kubelet[2485]: W0212 20:00:21.131610 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.131763 kubelet[2485]: E0212 20:00:21.131754 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.131943 kubelet[2485]: E0212 20:00:21.131935 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.132017 kubelet[2485]: W0212 20:00:21.132008 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.132169 kubelet[2485]: E0212 20:00:21.132161 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.132435 kubelet[2485]: E0212 20:00:21.132425 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.132517 kubelet[2485]: W0212 20:00:21.132508 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.132656 kubelet[2485]: E0212 20:00:21.132648 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.132863 kubelet[2485]: E0212 20:00:21.132854 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.132933 kubelet[2485]: W0212 20:00:21.132924 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.133077 kubelet[2485]: E0212 20:00:21.133069 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.133280 kubelet[2485]: E0212 20:00:21.133271 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.133361 kubelet[2485]: W0212 20:00:21.133351 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.133419 kubelet[2485]: E0212 20:00:21.133413 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.219550 kubelet[2485]: E0212 20:00:21.219527 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.219734 kubelet[2485]: W0212 20:00:21.219721 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.219822 kubelet[2485]: E0212 20:00:21.219814 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.225885 kubelet[2485]: E0212 20:00:21.225869 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.226029 kubelet[2485]: W0212 20:00:21.226017 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.226118 kubelet[2485]: E0212 20:00:21.226109 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.327655 kubelet[2485]: E0212 20:00:21.327614 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.327869 kubelet[2485]: W0212 20:00:21.327848 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.327974 kubelet[2485]: E0212 20:00:21.327951 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.378912 env[1331]: time="2024-02-12T20:00:21.378866643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x5px4,Uid:1e44c71e-f294-472e-bcbc-f44f1d5b6af4,Namespace:calico-system,Attempt:0,}" Feb 12 20:00:21.421683 kubelet[2485]: E0212 20:00:21.421661 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:21.422294 kubelet[2485]: W0212 20:00:21.422269 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:21.422453 kubelet[2485]: E0212 20:00:21.422442 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:21.455387 env[1331]: time="2024-02-12T20:00:21.455303644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:21.455596 env[1331]: time="2024-02-12T20:00:21.455565048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:21.455796 env[1331]: time="2024-02-12T20:00:21.455739751Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:21.456120 env[1331]: time="2024-02-12T20:00:21.456088156Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391 pid=3001 runtime=io.containerd.runc.v2 Feb 12 20:00:21.484095 systemd[1]: Started cri-containerd-77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391.scope. Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.509000 audit: BPF prog-id=132 op=LOAD Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3001 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393735323131393338383632613061383562353431303166353335 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3001 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393735323131393338383632613061383562353431303166353335 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit: BPF prog-id=133 op=LOAD Feb 12 20:00:21.510000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025200 items=0 ppid=3001 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393735323131393338383632613061383562353431303166353335 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit: BPF prog-id=134 op=LOAD Feb 12 20:00:21.510000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025248 items=0 ppid=3001 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393735323131393338383632613061383562353431303166353335 Feb 12 20:00:21.510000 audit: BPF prog-id=134 op=UNLOAD Feb 12 20:00:21.510000 audit: BPF prog-id=133 op=UNLOAD Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:21.510000 audit: BPF prog-id=135 op=LOAD Feb 12 20:00:21.510000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025658 items=0 ppid=3001 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737393735323131393338383632613061383562353431303166353335 Feb 12 20:00:21.532598 env[1331]: time="2024-02-12T20:00:21.532554657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-x5px4,Uid:1e44c71e-f294-472e-bcbc-f44f1d5b6af4,Namespace:calico-system,Attempt:0,} returns sandbox id \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\"" Feb 12 20:00:21.737464 systemd[1]: run-containerd-runc-k8s.io-f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98-runc.raJrjy.mount: Deactivated successfully. Feb 12 20:00:21.854000 audit[3061]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:21.854000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffee0c3fed0 a2=0 a3=7ffee0c3febc items=0 ppid=2681 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:21.855000 audit[3061]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:21.855000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffee0c3fed0 a2=0 a3=7ffee0c3febc items=0 ppid=2681 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:21.855000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:22.088305 kubelet[2485]: E0212 20:00:22.088272 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:24.088535 kubelet[2485]: E0212 20:00:24.088380 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:26.087643 kubelet[2485]: E0212 20:00:26.087601 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:28.086558 kubelet[2485]: E0212 20:00:28.086511 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:30.087504 kubelet[2485]: E0212 20:00:30.086355 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:30.450588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount748074971.mount: Deactivated successfully. Feb 12 20:00:32.086493 kubelet[2485]: E0212 20:00:32.086452 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:34.087135 kubelet[2485]: E0212 20:00:34.086658 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:36.086975 kubelet[2485]: E0212 20:00:36.086932 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:38.086467 kubelet[2485]: E0212 20:00:38.086427 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:39.093740 env[1331]: time="2024-02-12T20:00:39.093669844Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:39.138134 env[1331]: time="2024-02-12T20:00:39.138075288Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:39.149850 env[1331]: time="2024-02-12T20:00:39.149808205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:39.190808 env[1331]: time="2024-02-12T20:00:39.190758814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:39.191631 env[1331]: time="2024-02-12T20:00:39.191590322Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 20:00:39.193426 env[1331]: time="2024-02-12T20:00:39.193043937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:00:39.209386 env[1331]: time="2024-02-12T20:00:39.209349899Z" level=info msg="CreateContainer within sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:00:39.385427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4213993486.mount: Deactivated successfully. Feb 12 20:00:39.496176 env[1331]: time="2024-02-12T20:00:39.496121163Z" level=info msg="CreateContainer within sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\"" Feb 12 20:00:39.496787 env[1331]: time="2024-02-12T20:00:39.496730469Z" level=info msg="StartContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\"" Feb 12 20:00:39.518729 systemd[1]: Started cri-containerd-6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406.scope. Feb 12 20:00:39.551531 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 20:00:39.551757 kernel: audit: type=1400 audit(1707768039.532:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.567299 kernel: audit: type=1400 audit(1707768039.532:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.583255 kernel: audit: type=1400 audit(1707768039.532:1136): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.598329 kernel: audit: type=1400 audit(1707768039.532:1137): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.612246 kernel: audit: type=1400 audit(1707768039.532:1138): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.642426 kernel: audit: type=1400 audit(1707768039.532:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.642522 kernel: audit: type=1400 audit(1707768039.532:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.642547 kernel: audit: type=1400 audit(1707768039.532:1141): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.684385 kernel: audit: type=1400 audit(1707768039.532:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.684493 kernel: audit: type=1400 audit(1707768039.550:1143): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.550000 audit: BPF prog-id=136 op=LOAD Feb 12 20:00:39.550000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.550000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2904 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:39.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638323366333336313838313364653738613962663364616264 Feb 12 20:00:39.550000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.550000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2904 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:39.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638323366333336313838313364653738613962663364616264 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit: BPF prog-id=137 op=LOAD Feb 12 20:00:39.551000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00027bdc0 items=0 ppid=2904 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638323366333336313838313364653738613962663364616264 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit: BPF prog-id=138 op=LOAD Feb 12 20:00:39.551000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00027be08 items=0 ppid=2904 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638323366333336313838313364653738613962663364616264 Feb 12 20:00:39.551000 audit: BPF prog-id=138 op=UNLOAD Feb 12 20:00:39.551000 audit: BPF prog-id=137 op=UNLOAD Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:39.551000 audit: BPF prog-id=139 op=LOAD Feb 12 20:00:39.551000 audit[3073]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003d6218 items=0 ppid=2904 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:39.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634373638323366333336313838313364653738613962663364616264 Feb 12 20:00:39.686853 env[1331]: time="2024-02-12T20:00:39.686818567Z" level=info msg="StartContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" returns successfully" Feb 12 20:00:40.086350 kubelet[2485]: E0212 20:00:40.086310 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:40.174188 env[1331]: time="2024-02-12T20:00:40.174149603Z" level=info msg="StopContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" with timeout 300 (s)" Feb 12 20:00:40.175155 env[1331]: time="2024-02-12T20:00:40.175126712Z" level=info msg="Stop container \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" with signal terminated" Feb 12 20:00:40.186212 systemd[1]: cri-containerd-6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406.scope: Deactivated successfully. Feb 12 20:00:40.185000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:00:40.189000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:00:40.212160 kubelet[2485]: I0212 20:00:40.212130 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5c67d448f8-ghbx4" podStartSLOduration=-9.223372016642693e+09 pod.CreationTimestamp="2024-02-12 20:00:20 +0000 UTC" firstStartedPulling="2024-02-12 20:00:21.062091978 +0000 UTC m=+19.213727755" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:40.202099677 +0000 UTC m=+38.353735554" watchObservedRunningTime="2024-02-12 20:00:40.212083275 +0000 UTC m=+38.363719152" Feb 12 20:00:40.224480 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406-rootfs.mount: Deactivated successfully. Feb 12 20:00:40.256000 audit[3147]: NETFILTER_CFG table=filter:113 family=2 entries=13 op=nft_register_rule pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:40.256000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffe7eb44a40 a2=0 a3=7ffe7eb44a2c items=0 ppid=2681 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:40.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:40.257000 audit[3147]: NETFILTER_CFG table=nat:114 family=2 entries=27 op=nft_register_chain pid=3147 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:40.257000 audit[3147]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffe7eb44a40 a2=0 a3=7ffe7eb44a2c items=0 ppid=2681 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:40.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:42.086450 kubelet[2485]: E0212 20:00:42.086402 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:43.549573 env[1331]: time="2024-02-12T20:00:43.549518210Z" level=info msg="shim disconnected" id=6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406 Feb 12 20:00:43.549573 env[1331]: time="2024-02-12T20:00:43.549568911Z" level=warning msg="cleaning up after shim disconnected" id=6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406 namespace=k8s.io Feb 12 20:00:43.549573 env[1331]: time="2024-02-12T20:00:43.549580211Z" level=info msg="cleaning up dead shim" Feb 12 20:00:43.558352 env[1331]: time="2024-02-12T20:00:43.558301192Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:00:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3148 runtime=io.containerd.runc.v2\n" Feb 12 20:00:43.564940 env[1331]: time="2024-02-12T20:00:43.564897654Z" level=info msg="StopContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" returns successfully" Feb 12 20:00:43.565643 env[1331]: time="2024-02-12T20:00:43.565613260Z" level=info msg="StopPodSandbox for \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\"" Feb 12 20:00:43.568814 env[1331]: time="2024-02-12T20:00:43.565678361Z" level=info msg="Container to stop \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 20:00:43.568139 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98-shm.mount: Deactivated successfully. Feb 12 20:00:43.575000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:00:43.576373 systemd[1]: cri-containerd-f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98.scope: Deactivated successfully. Feb 12 20:00:43.579000 audit: BPF prog-id=131 op=UNLOAD Feb 12 20:00:43.598531 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98-rootfs.mount: Deactivated successfully. Feb 12 20:00:43.614018 env[1331]: time="2024-02-12T20:00:43.613964710Z" level=info msg="shim disconnected" id=f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98 Feb 12 20:00:43.614215 env[1331]: time="2024-02-12T20:00:43.614169412Z" level=warning msg="cleaning up after shim disconnected" id=f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98 namespace=k8s.io Feb 12 20:00:43.614215 env[1331]: time="2024-02-12T20:00:43.614188412Z" level=info msg="cleaning up dead shim" Feb 12 20:00:43.622467 env[1331]: time="2024-02-12T20:00:43.622421789Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:00:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3179 runtime=io.containerd.runc.v2\n" Feb 12 20:00:43.622855 env[1331]: time="2024-02-12T20:00:43.622820192Z" level=info msg="TearDown network for sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" successfully" Feb 12 20:00:43.622942 env[1331]: time="2024-02-12T20:00:43.622852993Z" level=info msg="StopPodSandbox for \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" returns successfully" Feb 12 20:00:43.779709 kubelet[2485]: E0212 20:00:43.779673 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.779709 kubelet[2485]: W0212 20:00:43.779698 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.780368 kubelet[2485]: E0212 20:00:43.779725 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.780368 kubelet[2485]: I0212 20:00:43.779780 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe8e66ff-384c-48d9-8d60-155cb33d8bca-typha-certs\") pod \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " Feb 12 20:00:43.780368 kubelet[2485]: E0212 20:00:43.780271 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.780368 kubelet[2485]: W0212 20:00:43.780286 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.780368 kubelet[2485]: E0212 20:00:43.780312 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.780368 kubelet[2485]: I0212 20:00:43.780344 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jg5h6\" (UniqueName: \"kubernetes.io/projected/fe8e66ff-384c-48d9-8d60-155cb33d8bca-kube-api-access-jg5h6\") pod \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " Feb 12 20:00:43.780649 kubelet[2485]: E0212 20:00:43.780604 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.780649 kubelet[2485]: W0212 20:00:43.780624 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.780649 kubelet[2485]: E0212 20:00:43.780643 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.780767 kubelet[2485]: I0212 20:00:43.780672 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe8e66ff-384c-48d9-8d60-155cb33d8bca-tigera-ca-bundle\") pod \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\" (UID: \"fe8e66ff-384c-48d9-8d60-155cb33d8bca\") " Feb 12 20:00:43.782674 kubelet[2485]: E0212 20:00:43.781200 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.782674 kubelet[2485]: W0212 20:00:43.781220 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.782674 kubelet[2485]: E0212 20:00:43.781253 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.783896 kubelet[2485]: E0212 20:00:43.783871 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.784011 kubelet[2485]: W0212 20:00:43.783912 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.784011 kubelet[2485]: E0212 20:00:43.783930 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.787304 systemd[1]: var-lib-kubelet-pods-fe8e66ff\x2d384c\x2d48d9\x2d8d60\x2d155cb33d8bca-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 12 20:00:43.789894 systemd[1]: var-lib-kubelet-pods-fe8e66ff\x2d384c\x2d48d9\x2d8d60\x2d155cb33d8bca-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 12 20:00:43.790727 kubelet[2485]: I0212 20:00:43.790566 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/fe8e66ff-384c-48d9-8d60-155cb33d8bca-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "fe8e66ff-384c-48d9-8d60-155cb33d8bca" (UID: "fe8e66ff-384c-48d9-8d60-155cb33d8bca"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 20:00:43.792121 kubelet[2485]: E0212 20:00:43.792100 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:43.792121 kubelet[2485]: W0212 20:00:43.792115 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:43.792315 kubelet[2485]: E0212 20:00:43.792138 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:43.792315 kubelet[2485]: W0212 20:00:43.792285 2485 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/fe8e66ff-384c-48d9-8d60-155cb33d8bca/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 20:00:43.792554 kubelet[2485]: I0212 20:00:43.792531 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/fe8e66ff-384c-48d9-8d60-155cb33d8bca-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "fe8e66ff-384c-48d9-8d60-155cb33d8bca" (UID: "fe8e66ff-384c-48d9-8d60-155cb33d8bca"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 20:00:43.796476 systemd[1]: var-lib-kubelet-pods-fe8e66ff\x2d384c\x2d48d9\x2d8d60\x2d155cb33d8bca-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djg5h6.mount: Deactivated successfully. Feb 12 20:00:43.797245 kubelet[2485]: I0212 20:00:43.797201 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/fe8e66ff-384c-48d9-8d60-155cb33d8bca-kube-api-access-jg5h6" (OuterVolumeSpecName: "kube-api-access-jg5h6") pod "fe8e66ff-384c-48d9-8d60-155cb33d8bca" (UID: "fe8e66ff-384c-48d9-8d60-155cb33d8bca"). InnerVolumeSpecName "kube-api-access-jg5h6". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 20:00:43.881086 kubelet[2485]: I0212 20:00:43.880958 2485 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-jg5h6\" (UniqueName: \"kubernetes.io/projected/fe8e66ff-384c-48d9-8d60-155cb33d8bca-kube-api-access-jg5h6\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:43.881086 kubelet[2485]: I0212 20:00:43.880996 2485 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe8e66ff-384c-48d9-8d60-155cb33d8bca-tigera-ca-bundle\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:43.881086 kubelet[2485]: I0212 20:00:43.881010 2485 reconciler_common.go:295] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe8e66ff-384c-48d9-8d60-155cb33d8bca-typha-certs\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:44.086779 kubelet[2485]: E0212 20:00:44.086741 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:44.093143 systemd[1]: Removed slice kubepods-besteffort-podfe8e66ff_384c_48d9_8d60_155cb33d8bca.slice. Feb 12 20:00:44.181826 kubelet[2485]: I0212 20:00:44.181708 2485 scope.go:115] "RemoveContainer" containerID="6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406" Feb 12 20:00:44.184063 env[1331]: time="2024-02-12T20:00:44.183687780Z" level=info msg="RemoveContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\"" Feb 12 20:00:44.196030 env[1331]: time="2024-02-12T20:00:44.195978293Z" level=info msg="RemoveContainer for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" returns successfully" Feb 12 20:00:44.196331 kubelet[2485]: I0212 20:00:44.196296 2485 scope.go:115] "RemoveContainer" containerID="6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406" Feb 12 20:00:44.196656 env[1331]: time="2024-02-12T20:00:44.196573498Z" level=error msg="ContainerStatus for \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\": not found" Feb 12 20:00:44.196829 kubelet[2485]: E0212 20:00:44.196807 2485 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\": not found" containerID="6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406" Feb 12 20:00:44.196931 kubelet[2485]: I0212 20:00:44.196872 2485 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406} err="failed to get container status \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\": rpc error: code = NotFound desc = an error occurred when try to find container \"6476823f33618813de78a9bf3dabdc15c4c975fed90cd14140097d3c4379c406\": not found" Feb 12 20:00:44.220639 kubelet[2485]: I0212 20:00:44.220595 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:44.220827 kubelet[2485]: E0212 20:00:44.220684 2485 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="fe8e66ff-384c-48d9-8d60-155cb33d8bca" containerName="calico-typha" Feb 12 20:00:44.220827 kubelet[2485]: I0212 20:00:44.220725 2485 memory_manager.go:346] "RemoveStaleState removing state" podUID="fe8e66ff-384c-48d9-8d60-155cb33d8bca" containerName="calico-typha" Feb 12 20:00:44.230810 systemd[1]: Created slice kubepods-besteffort-podb17ab117_a4c0_48bb_bdee_f24719580df4.slice. Feb 12 20:00:44.273000 audit[3225]: NETFILTER_CFG table=filter:115 family=2 entries=13 op=nft_register_rule pid=3225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:44.273000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff5d208850 a2=0 a3=7fff5d20883c items=0 ppid=2681 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:44.274000 audit[3225]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_unregister_chain pid=3225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:44.274000 audit[3225]: SYSCALL arch=c000003e syscall=46 success=yes exit=5596 a0=3 a1=7fff5d208850 a2=0 a3=7fff5d20883c items=0 ppid=2681 pid=3225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:44.282862 kubelet[2485]: E0212 20:00:44.282832 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.282862 kubelet[2485]: W0212 20:00:44.282852 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.283073 kubelet[2485]: E0212 20:00:44.282877 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.283128 kubelet[2485]: E0212 20:00:44.283083 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.283128 kubelet[2485]: W0212 20:00:44.283094 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.283128 kubelet[2485]: E0212 20:00:44.283111 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.283376 kubelet[2485]: E0212 20:00:44.283332 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.283376 kubelet[2485]: W0212 20:00:44.283343 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.283376 kubelet[2485]: E0212 20:00:44.283361 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.283591 kubelet[2485]: E0212 20:00:44.283571 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.283591 kubelet[2485]: W0212 20:00:44.283585 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.283591 kubelet[2485]: E0212 20:00:44.283600 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.283917 kubelet[2485]: E0212 20:00:44.283899 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.283917 kubelet[2485]: W0212 20:00:44.283919 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.284064 kubelet[2485]: E0212 20:00:44.283936 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.284138 kubelet[2485]: E0212 20:00:44.284120 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.284202 kubelet[2485]: W0212 20:00:44.284139 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.284202 kubelet[2485]: E0212 20:00:44.284154 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.284458 kubelet[2485]: E0212 20:00:44.284441 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.284537 kubelet[2485]: W0212 20:00:44.284458 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.284537 kubelet[2485]: E0212 20:00:44.284474 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.284784 kubelet[2485]: E0212 20:00:44.284765 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.284784 kubelet[2485]: W0212 20:00:44.284778 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.284907 kubelet[2485]: E0212 20:00:44.284793 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.285019 kubelet[2485]: E0212 20:00:44.285001 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.285019 kubelet[2485]: W0212 20:00:44.285014 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.285127 kubelet[2485]: E0212 20:00:44.285029 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.285439 kubelet[2485]: E0212 20:00:44.285418 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.285439 kubelet[2485]: W0212 20:00:44.285434 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.285574 kubelet[2485]: E0212 20:00:44.285450 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.285574 kubelet[2485]: I0212 20:00:44.285489 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z27pj\" (UniqueName: \"kubernetes.io/projected/b17ab117-a4c0-48bb-bdee-f24719580df4-kube-api-access-z27pj\") pod \"calico-typha-84cb444f5f-dtm2q\" (UID: \"b17ab117-a4c0-48bb-bdee-f24719580df4\") " pod="calico-system/calico-typha-84cb444f5f-dtm2q" Feb 12 20:00:44.285826 kubelet[2485]: E0212 20:00:44.285807 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.285826 kubelet[2485]: W0212 20:00:44.285822 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.285956 kubelet[2485]: E0212 20:00:44.285844 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.285956 kubelet[2485]: I0212 20:00:44.285873 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b17ab117-a4c0-48bb-bdee-f24719580df4-tigera-ca-bundle\") pod \"calico-typha-84cb444f5f-dtm2q\" (UID: \"b17ab117-a4c0-48bb-bdee-f24719580df4\") " pod="calico-system/calico-typha-84cb444f5f-dtm2q" Feb 12 20:00:44.286184 kubelet[2485]: E0212 20:00:44.286165 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.286184 kubelet[2485]: W0212 20:00:44.286178 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.286384 kubelet[2485]: E0212 20:00:44.286194 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.286441 kubelet[2485]: E0212 20:00:44.286404 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.286441 kubelet[2485]: W0212 20:00:44.286415 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.286441 kubelet[2485]: E0212 20:00:44.286432 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.286665 kubelet[2485]: E0212 20:00:44.286641 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.286665 kubelet[2485]: W0212 20:00:44.286653 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.286791 kubelet[2485]: E0212 20:00:44.286669 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.286846 kubelet[2485]: E0212 20:00:44.286830 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.286846 kubelet[2485]: W0212 20:00:44.286839 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.286930 kubelet[2485]: E0212 20:00:44.286855 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.287060 kubelet[2485]: E0212 20:00:44.287042 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.287060 kubelet[2485]: W0212 20:00:44.287054 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.287171 kubelet[2485]: E0212 20:00:44.287068 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.287171 kubelet[2485]: I0212 20:00:44.287099 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b17ab117-a4c0-48bb-bdee-f24719580df4-typha-certs\") pod \"calico-typha-84cb444f5f-dtm2q\" (UID: \"b17ab117-a4c0-48bb-bdee-f24719580df4\") " pod="calico-system/calico-typha-84cb444f5f-dtm2q" Feb 12 20:00:44.287466 kubelet[2485]: E0212 20:00:44.287439 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.287466 kubelet[2485]: W0212 20:00:44.287453 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.287590 kubelet[2485]: E0212 20:00:44.287469 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.287777 kubelet[2485]: E0212 20:00:44.287759 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.287777 kubelet[2485]: W0212 20:00:44.287772 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.287904 kubelet[2485]: E0212 20:00:44.287789 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.317000 audit[3269]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:44.317000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffdc00b91a0 a2=0 a3=7ffdc00b918c items=0 ppid=2681 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:44.318000 audit[3269]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=3269 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:44.318000 audit[3269]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdc00b91a0 a2=0 a3=7ffdc00b918c items=0 ppid=2681 pid=3269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:44.388469 kubelet[2485]: E0212 20:00:44.388437 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.388469 kubelet[2485]: W0212 20:00:44.388458 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.388717 kubelet[2485]: E0212 20:00:44.388482 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.388812 kubelet[2485]: E0212 20:00:44.388794 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.388812 kubelet[2485]: W0212 20:00:44.388808 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.388921 kubelet[2485]: E0212 20:00:44.388830 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.389093 kubelet[2485]: E0212 20:00:44.389078 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.389093 kubelet[2485]: W0212 20:00:44.389091 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.389224 kubelet[2485]: E0212 20:00:44.389111 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.389406 kubelet[2485]: E0212 20:00:44.389388 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.389480 kubelet[2485]: W0212 20:00:44.389407 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.389480 kubelet[2485]: E0212 20:00:44.389429 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.389664 kubelet[2485]: E0212 20:00:44.389649 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.389664 kubelet[2485]: W0212 20:00:44.389660 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.389785 kubelet[2485]: E0212 20:00:44.389692 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.389932 kubelet[2485]: E0212 20:00:44.389912 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.389932 kubelet[2485]: W0212 20:00:44.389924 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.390051 kubelet[2485]: E0212 20:00:44.390009 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.390206 kubelet[2485]: E0212 20:00:44.390183 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.390206 kubelet[2485]: W0212 20:00:44.390203 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.390358 kubelet[2485]: E0212 20:00:44.390307 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.390453 kubelet[2485]: E0212 20:00:44.390437 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.390453 kubelet[2485]: W0212 20:00:44.390449 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.390582 kubelet[2485]: E0212 20:00:44.390528 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.390668 kubelet[2485]: E0212 20:00:44.390652 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.390668 kubelet[2485]: W0212 20:00:44.390664 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.390795 kubelet[2485]: E0212 20:00:44.390682 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.391479 kubelet[2485]: E0212 20:00:44.391463 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.391593 kubelet[2485]: W0212 20:00:44.391571 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.391668 kubelet[2485]: E0212 20:00:44.391598 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.391811 kubelet[2485]: E0212 20:00:44.391793 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.391885 kubelet[2485]: W0212 20:00:44.391806 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.391938 kubelet[2485]: E0212 20:00:44.391894 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.392097 kubelet[2485]: E0212 20:00:44.392081 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.392172 kubelet[2485]: W0212 20:00:44.392093 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.392308 kubelet[2485]: E0212 20:00:44.392296 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.392714 kubelet[2485]: E0212 20:00:44.392508 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.392714 kubelet[2485]: W0212 20:00:44.392547 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.392714 kubelet[2485]: E0212 20:00:44.392567 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.392881 kubelet[2485]: E0212 20:00:44.392803 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.392881 kubelet[2485]: W0212 20:00:44.392813 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.392881 kubelet[2485]: E0212 20:00:44.392830 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.393388 kubelet[2485]: E0212 20:00:44.393369 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.393474 kubelet[2485]: W0212 20:00:44.393390 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.393474 kubelet[2485]: E0212 20:00:44.393406 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.393651 kubelet[2485]: E0212 20:00:44.393636 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.393708 kubelet[2485]: W0212 20:00:44.393651 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.393708 kubelet[2485]: E0212 20:00:44.393676 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.397107 kubelet[2485]: E0212 20:00:44.397092 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.397107 kubelet[2485]: W0212 20:00:44.397258 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.397107 kubelet[2485]: E0212 20:00:44.397282 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.402683 kubelet[2485]: E0212 20:00:44.402665 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:44.402683 kubelet[2485]: W0212 20:00:44.402679 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:44.402823 kubelet[2485]: E0212 20:00:44.402696 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:44.535301 env[1331]: time="2024-02-12T20:00:44.535170894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84cb444f5f-dtm2q,Uid:b17ab117-a4c0-48bb-bdee-f24719580df4,Namespace:calico-system,Attempt:0,}" Feb 12 20:00:44.574437 env[1331]: time="2024-02-12T20:00:44.569491708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:44.574437 env[1331]: time="2024-02-12T20:00:44.569590309Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:44.574437 env[1331]: time="2024-02-12T20:00:44.569621909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:44.574437 env[1331]: time="2024-02-12T20:00:44.569767510Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849 pid=3298 runtime=io.containerd.runc.v2 Feb 12 20:00:44.599499 systemd[1]: run-containerd-runc-k8s.io-b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849-runc.jiReWR.mount: Deactivated successfully. Feb 12 20:00:44.606220 systemd[1]: Started cri-containerd-b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849.scope. Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.624773 kernel: kauditd_printk_skb: 69 callbacks suppressed Feb 12 20:00:44.624818 kernel: audit: type=1400 audit(1707768044.618:1162): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.653719 kernel: audit: type=1400 audit(1707768044.618:1163): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.668360 kernel: audit: type=1400 audit(1707768044.618:1164): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.682284 kernel: audit: type=1400 audit(1707768044.618:1165): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.711528 kernel: audit: type=1400 audit(1707768044.618:1166): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.711699 kernel: audit: type=1400 audit(1707768044.618:1167): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.711728 kernel: audit: type=1400 audit(1707768044.618:1168): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.739389 kernel: audit: type=1400 audit(1707768044.618:1169): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.757631 env[1331]: time="2024-02-12T20:00:44.751334170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84cb444f5f-dtm2q,Uid:b17ab117-a4c0-48bb-bdee-f24719580df4,Namespace:calico-system,Attempt:0,} returns sandbox id \"b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849\"" Feb 12 20:00:44.758255 kernel: audit: type=1400 audit(1707768044.618:1170): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.765419 env[1331]: time="2024-02-12T20:00:44.763218979Z" level=info msg="CreateContainer within sandbox \"b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:00:44.638000 audit: BPF prog-id=140 op=LOAD Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653835653930326266363265383863343365346165623562306262 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653835653930326266363265383863343365346165623562306262 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.772288 kernel: audit: type=1400 audit(1707768044.638:1171): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.643000 audit: BPF prog-id=141 op=LOAD Feb 12 20:00:44.643000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d1d50 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653835653930326266363265383863343365346165623562306262 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit: BPF prog-id=142 op=LOAD Feb 12 20:00:44.652000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d1d98 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653835653930326266363265383863343365346165623562306262 Feb 12 20:00:44.652000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:00:44.652000 audit: BPF prog-id=141 op=UNLOAD Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.652000 audit: BPF prog-id=143 op=LOAD Feb 12 20:00:44.652000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003561a8 items=0 ppid=3298 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233653835653930326266363265383863343365346165623562306262 Feb 12 20:00:44.837416 env[1331]: time="2024-02-12T20:00:44.837362557Z" level=info msg="CreateContainer within sandbox \"b3e85e902bf62e88c43e4aeb5b0bb790fb2b6bba0e5f50f75b57c8e698566849\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"422396a7c510e2daeb892dd9086b11439e4ffeaaa661583b460c241eef5946ca\"" Feb 12 20:00:44.839596 env[1331]: time="2024-02-12T20:00:44.839559777Z" level=info msg="StartContainer for \"422396a7c510e2daeb892dd9086b11439e4ffeaaa661583b460c241eef5946ca\"" Feb 12 20:00:44.867877 systemd[1]: Started cri-containerd-422396a7c510e2daeb892dd9086b11439e4ffeaaa661583b460c241eef5946ca.scope. Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.890000 audit: BPF prog-id=144 op=LOAD Feb 12 20:00:44.891000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.891000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3298 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323339366137633531306532646165623839326464393038366231 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3298 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323339366137633531306532646165623839326464393038366231 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.892000 audit: BPF prog-id=145 op=LOAD Feb 12 20:00:44.892000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003b1d40 items=0 ppid=3298 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323339366137633531306532646165623839326464393038366231 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit: BPF prog-id=146 op=LOAD Feb 12 20:00:44.893000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003b1d88 items=0 ppid=3298 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323339366137633531306532646165623839326464393038366231 Feb 12 20:00:44.893000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:00:44.893000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:44.893000 audit: BPF prog-id=147 op=LOAD Feb 12 20:00:44.893000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000416198 items=0 ppid=3298 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:44.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432323339366137633531306532646165623839326464393038366231 Feb 12 20:00:44.949449 env[1331]: time="2024-02-12T20:00:44.949404981Z" level=info msg="StartContainer for \"422396a7c510e2daeb892dd9086b11439e4ffeaaa661583b460c241eef5946ca\" returns successfully" Feb 12 20:00:45.201063 kubelet[2485]: E0212 20:00:45.200957 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.201539 kubelet[2485]: W0212 20:00:45.201520 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.201644 kubelet[2485]: E0212 20:00:45.201634 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.201953 kubelet[2485]: E0212 20:00:45.201940 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.202059 kubelet[2485]: W0212 20:00:45.202048 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.202137 kubelet[2485]: E0212 20:00:45.202129 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.202405 kubelet[2485]: E0212 20:00:45.202394 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.202515 kubelet[2485]: W0212 20:00:45.202504 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.202600 kubelet[2485]: E0212 20:00:45.202592 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.202916 kubelet[2485]: E0212 20:00:45.202904 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.203032 kubelet[2485]: W0212 20:00:45.203020 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.203134 kubelet[2485]: E0212 20:00:45.203117 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.203447 kubelet[2485]: E0212 20:00:45.203434 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.203565 kubelet[2485]: W0212 20:00:45.203553 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.203651 kubelet[2485]: E0212 20:00:45.203642 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.203915 kubelet[2485]: E0212 20:00:45.203905 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.204008 kubelet[2485]: W0212 20:00:45.203997 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.204098 kubelet[2485]: E0212 20:00:45.204090 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.204423 kubelet[2485]: E0212 20:00:45.204410 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.204543 kubelet[2485]: W0212 20:00:45.204532 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.204619 kubelet[2485]: E0212 20:00:45.204611 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.204862 kubelet[2485]: E0212 20:00:45.204851 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.204946 kubelet[2485]: W0212 20:00:45.204935 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.205022 kubelet[2485]: E0212 20:00:45.205014 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.205306 kubelet[2485]: E0212 20:00:45.205295 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.205405 kubelet[2485]: W0212 20:00:45.205393 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.205475 kubelet[2485]: E0212 20:00:45.205467 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.205724 kubelet[2485]: E0212 20:00:45.205712 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.205815 kubelet[2485]: W0212 20:00:45.205804 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.205904 kubelet[2485]: E0212 20:00:45.205895 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.206142 kubelet[2485]: E0212 20:00:45.206131 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.206255 kubelet[2485]: W0212 20:00:45.206223 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.206344 kubelet[2485]: E0212 20:00:45.206335 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.206578 kubelet[2485]: E0212 20:00:45.206567 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.206660 kubelet[2485]: W0212 20:00:45.206649 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.206731 kubelet[2485]: E0212 20:00:45.206723 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.214007 kubelet[2485]: I0212 20:00:45.213976 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-84cb444f5f-dtm2q" podStartSLOduration=24.213932667 pod.CreationTimestamp="2024-02-12 20:00:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:00:45.196329909 +0000 UTC m=+43.347965786" watchObservedRunningTime="2024-02-12 20:00:45.213932667 +0000 UTC m=+43.365568444" Feb 12 20:00:45.261000 audit[3409]: NETFILTER_CFG table=filter:119 family=2 entries=13 op=nft_register_rule pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:45.261000 audit[3409]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffc899e7e50 a2=0 a3=7ffc899e7e3c items=0 ppid=2681 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:45.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:45.261000 audit[3409]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:00:45.261000 audit[3409]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffc899e7e50 a2=0 a3=7ffc899e7e3c items=0 ppid=2681 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:45.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:00:45.301910 kubelet[2485]: E0212 20:00:45.301878 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.301910 kubelet[2485]: W0212 20:00:45.301900 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.302187 kubelet[2485]: E0212 20:00:45.301924 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.302187 kubelet[2485]: E0212 20:00:45.302179 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.302403 kubelet[2485]: W0212 20:00:45.302191 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.302403 kubelet[2485]: E0212 20:00:45.302218 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.302540 kubelet[2485]: E0212 20:00:45.302486 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.302540 kubelet[2485]: W0212 20:00:45.302496 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.302540 kubelet[2485]: E0212 20:00:45.302513 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.302890 kubelet[2485]: E0212 20:00:45.302769 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.302890 kubelet[2485]: W0212 20:00:45.302783 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.302890 kubelet[2485]: E0212 20:00:45.302803 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.303112 kubelet[2485]: E0212 20:00:45.303096 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.303112 kubelet[2485]: W0212 20:00:45.303108 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.303274 kubelet[2485]: E0212 20:00:45.303128 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.303379 kubelet[2485]: E0212 20:00:45.303365 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.303379 kubelet[2485]: W0212 20:00:45.303377 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.303398 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.303603 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.304346 kubelet[2485]: W0212 20:00:45.303611 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.303628 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.303913 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.304346 kubelet[2485]: W0212 20:00:45.303925 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.303954 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.304128 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.304346 kubelet[2485]: W0212 20:00:45.304136 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304346 kubelet[2485]: E0212 20:00:45.304168 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.304804 kubelet[2485]: E0212 20:00:45.304397 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.304804 kubelet[2485]: W0212 20:00:45.304407 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304804 kubelet[2485]: E0212 20:00:45.304490 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.304804 kubelet[2485]: E0212 20:00:45.304612 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.304804 kubelet[2485]: W0212 20:00:45.304620 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.304804 kubelet[2485]: E0212 20:00:45.304637 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.305071 kubelet[2485]: E0212 20:00:45.304850 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.305071 kubelet[2485]: W0212 20:00:45.304860 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.305071 kubelet[2485]: E0212 20:00:45.304879 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.305203 kubelet[2485]: E0212 20:00:45.305094 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.305203 kubelet[2485]: W0212 20:00:45.305104 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.305203 kubelet[2485]: E0212 20:00:45.305121 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.305386 kubelet[2485]: E0212 20:00:45.305342 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.305386 kubelet[2485]: W0212 20:00:45.305352 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.305386 kubelet[2485]: E0212 20:00:45.305371 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.305618 kubelet[2485]: E0212 20:00:45.305594 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.305618 kubelet[2485]: W0212 20:00:45.305612 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.305782 kubelet[2485]: E0212 20:00:45.305716 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.306030 kubelet[2485]: E0212 20:00:45.306014 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.306030 kubelet[2485]: W0212 20:00:45.306026 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.306158 kubelet[2485]: E0212 20:00:45.306045 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.306438 kubelet[2485]: E0212 20:00:45.306423 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.306438 kubelet[2485]: W0212 20:00:45.306436 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.306588 kubelet[2485]: E0212 20:00:45.306457 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:45.306679 kubelet[2485]: E0212 20:00:45.306662 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:45.306679 kubelet[2485]: W0212 20:00:45.306676 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:45.306771 kubelet[2485]: E0212 20:00:45.306691 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.088172 kubelet[2485]: E0212 20:00:46.086030 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:46.093053 kubelet[2485]: I0212 20:00:46.093021 2485 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=fe8e66ff-384c-48d9-8d60-155cb33d8bca path="/var/lib/kubelet/pods/fe8e66ff-384c-48d9-8d60-155cb33d8bca/volumes" Feb 12 20:00:46.214550 kubelet[2485]: E0212 20:00:46.214506 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.214550 kubelet[2485]: W0212 20:00:46.214538 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.214550 kubelet[2485]: E0212 20:00:46.214564 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.215168 kubelet[2485]: E0212 20:00:46.214771 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.215168 kubelet[2485]: W0212 20:00:46.214782 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.215168 kubelet[2485]: E0212 20:00:46.214796 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.215168 kubelet[2485]: E0212 20:00:46.214951 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.215168 kubelet[2485]: W0212 20:00:46.214959 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.215168 kubelet[2485]: E0212 20:00:46.214972 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.215168 kubelet[2485]: E0212 20:00:46.215158 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.215168 kubelet[2485]: W0212 20:00:46.215166 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.215783 kubelet[2485]: E0212 20:00:46.215183 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.215783 kubelet[2485]: E0212 20:00:46.215367 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.215783 kubelet[2485]: W0212 20:00:46.215379 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.215783 kubelet[2485]: E0212 20:00:46.215394 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.215783 kubelet[2485]: E0212 20:00:46.215545 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.215783 kubelet[2485]: W0212 20:00:46.215553 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.215783 kubelet[2485]: E0212 20:00:46.215566 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216104 kubelet[2485]: E0212 20:00:46.215811 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216104 kubelet[2485]: W0212 20:00:46.215821 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216104 kubelet[2485]: E0212 20:00:46.215837 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216104 kubelet[2485]: E0212 20:00:46.215988 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216104 kubelet[2485]: W0212 20:00:46.215997 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216104 kubelet[2485]: E0212 20:00:46.216009 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216387 kubelet[2485]: E0212 20:00:46.216154 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216387 kubelet[2485]: W0212 20:00:46.216163 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216387 kubelet[2485]: E0212 20:00:46.216176 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216387 kubelet[2485]: E0212 20:00:46.216349 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216387 kubelet[2485]: W0212 20:00:46.216358 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216387 kubelet[2485]: E0212 20:00:46.216372 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216657 kubelet[2485]: E0212 20:00:46.216523 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216657 kubelet[2485]: W0212 20:00:46.216530 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216657 kubelet[2485]: E0212 20:00:46.216544 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.216781 kubelet[2485]: E0212 20:00:46.216690 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.216781 kubelet[2485]: W0212 20:00:46.216699 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.216781 kubelet[2485]: E0212 20:00:46.216712 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.309155 kubelet[2485]: E0212 20:00:46.309127 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.309155 kubelet[2485]: W0212 20:00:46.309145 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.309447 kubelet[2485]: E0212 20:00:46.309179 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.309614 kubelet[2485]: E0212 20:00:46.309542 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.309614 kubelet[2485]: W0212 20:00:46.309556 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.309614 kubelet[2485]: E0212 20:00:46.309577 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.309812 kubelet[2485]: E0212 20:00:46.309794 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.309812 kubelet[2485]: W0212 20:00:46.309804 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.309903 kubelet[2485]: E0212 20:00:46.309831 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.310051 kubelet[2485]: E0212 20:00:46.310037 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.310143 kubelet[2485]: W0212 20:00:46.310130 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.310223 kubelet[2485]: E0212 20:00:46.310213 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.310549 kubelet[2485]: E0212 20:00:46.310531 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.310549 kubelet[2485]: W0212 20:00:46.310544 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.310691 kubelet[2485]: E0212 20:00:46.310564 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.310833 kubelet[2485]: E0212 20:00:46.310815 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.310902 kubelet[2485]: W0212 20:00:46.310834 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.310902 kubelet[2485]: E0212 20:00:46.310854 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.311098 kubelet[2485]: E0212 20:00:46.311083 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.311098 kubelet[2485]: W0212 20:00:46.311095 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.311253 kubelet[2485]: E0212 20:00:46.311114 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.311342 kubelet[2485]: E0212 20:00:46.311325 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.311342 kubelet[2485]: W0212 20:00:46.311339 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.311465 kubelet[2485]: E0212 20:00:46.311358 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.311569 kubelet[2485]: E0212 20:00:46.311554 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.311569 kubelet[2485]: W0212 20:00:46.311565 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.311694 kubelet[2485]: E0212 20:00:46.311645 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.311782 kubelet[2485]: E0212 20:00:46.311765 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.311782 kubelet[2485]: W0212 20:00:46.311779 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.311889 kubelet[2485]: E0212 20:00:46.311856 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.312517 kubelet[2485]: E0212 20:00:46.312499 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.312517 kubelet[2485]: W0212 20:00:46.312513 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.312672 kubelet[2485]: E0212 20:00:46.312623 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.312770 kubelet[2485]: E0212 20:00:46.312753 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.312770 kubelet[2485]: W0212 20:00:46.312765 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.312876 kubelet[2485]: E0212 20:00:46.312784 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.313154 kubelet[2485]: E0212 20:00:46.313138 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.313154 kubelet[2485]: W0212 20:00:46.313150 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.313347 kubelet[2485]: E0212 20:00:46.313169 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.313394 kubelet[2485]: E0212 20:00:46.313385 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.313436 kubelet[2485]: W0212 20:00:46.313395 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.313436 kubelet[2485]: E0212 20:00:46.313411 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.313591 kubelet[2485]: E0212 20:00:46.313574 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.313591 kubelet[2485]: W0212 20:00:46.313587 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.313715 kubelet[2485]: E0212 20:00:46.313600 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.313764 kubelet[2485]: E0212 20:00:46.313758 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.313807 kubelet[2485]: W0212 20:00:46.313767 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.313807 kubelet[2485]: E0212 20:00:46.313783 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.313977 kubelet[2485]: E0212 20:00:46.313963 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.313977 kubelet[2485]: W0212 20:00:46.313975 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.314091 kubelet[2485]: E0212 20:00:46.313988 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:46.314337 kubelet[2485]: E0212 20:00:46.314321 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:46.314337 kubelet[2485]: W0212 20:00:46.314333 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:46.314430 kubelet[2485]: E0212 20:00:46.314348 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.222560 kubelet[2485]: E0212 20:00:47.222098 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.222560 kubelet[2485]: W0212 20:00:47.222123 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.222560 kubelet[2485]: E0212 20:00:47.222147 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.222560 kubelet[2485]: E0212 20:00:47.222390 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.222560 kubelet[2485]: W0212 20:00:47.222401 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.222560 kubelet[2485]: E0212 20:00:47.222415 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.222594 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.223280 kubelet[2485]: W0212 20:00:47.222604 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.222619 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.222857 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.223280 kubelet[2485]: W0212 20:00:47.222867 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.222882 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.223041 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.223280 kubelet[2485]: W0212 20:00:47.223049 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.223280 kubelet[2485]: E0212 20:00:47.223062 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.224099 kubelet[2485]: E0212 20:00:47.223924 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.224099 kubelet[2485]: W0212 20:00:47.223940 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.224099 kubelet[2485]: E0212 20:00:47.223956 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.224728 kubelet[2485]: E0212 20:00:47.224709 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.224728 kubelet[2485]: W0212 20:00:47.224726 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.224908 kubelet[2485]: E0212 20:00:47.224743 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.224963 kubelet[2485]: E0212 20:00:47.224927 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.224963 kubelet[2485]: W0212 20:00:47.224938 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.224963 kubelet[2485]: E0212 20:00:47.224953 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.225144 kubelet[2485]: E0212 20:00:47.225130 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.225208 kubelet[2485]: W0212 20:00:47.225145 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.225208 kubelet[2485]: E0212 20:00:47.225160 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.225376 kubelet[2485]: E0212 20:00:47.225361 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.225442 kubelet[2485]: W0212 20:00:47.225378 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.225442 kubelet[2485]: E0212 20:00:47.225393 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.225587 kubelet[2485]: E0212 20:00:47.225572 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.225650 kubelet[2485]: W0212 20:00:47.225588 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.225650 kubelet[2485]: E0212 20:00:47.225602 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.225786 kubelet[2485]: E0212 20:00:47.225771 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.225843 kubelet[2485]: W0212 20:00:47.225787 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.225843 kubelet[2485]: E0212 20:00:47.225801 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.316818 kubelet[2485]: E0212 20:00:47.316787 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.316818 kubelet[2485]: W0212 20:00:47.316808 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.317045 kubelet[2485]: E0212 20:00:47.316831 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.317140 kubelet[2485]: E0212 20:00:47.317125 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.317140 kubelet[2485]: W0212 20:00:47.317138 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.317278 kubelet[2485]: E0212 20:00:47.317165 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.317453 kubelet[2485]: E0212 20:00:47.317435 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.317582 kubelet[2485]: W0212 20:00:47.317465 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.317582 kubelet[2485]: E0212 20:00:47.317487 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.317725 kubelet[2485]: E0212 20:00:47.317706 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.317725 kubelet[2485]: W0212 20:00:47.317716 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.317813 kubelet[2485]: E0212 20:00:47.317731 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.317992 kubelet[2485]: E0212 20:00:47.317977 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.317992 kubelet[2485]: W0212 20:00:47.317988 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.318123 kubelet[2485]: E0212 20:00:47.318008 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.318194 kubelet[2485]: E0212 20:00:47.318177 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.318194 kubelet[2485]: W0212 20:00:47.318191 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.318311 kubelet[2485]: E0212 20:00:47.318207 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.318448 kubelet[2485]: E0212 20:00:47.318433 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.318448 kubelet[2485]: W0212 20:00:47.318445 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.318563 kubelet[2485]: E0212 20:00:47.318530 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.319093 kubelet[2485]: E0212 20:00:47.319061 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.319093 kubelet[2485]: W0212 20:00:47.319081 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.319269 kubelet[2485]: E0212 20:00:47.319171 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.319335 kubelet[2485]: E0212 20:00:47.319326 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.319384 kubelet[2485]: W0212 20:00:47.319336 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.319429 kubelet[2485]: E0212 20:00:47.319422 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.319572 kubelet[2485]: E0212 20:00:47.319555 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.319572 kubelet[2485]: W0212 20:00:47.319569 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.319690 kubelet[2485]: E0212 20:00:47.319588 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.319832 kubelet[2485]: E0212 20:00:47.319817 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.319832 kubelet[2485]: W0212 20:00:47.319828 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.319944 kubelet[2485]: E0212 20:00:47.319848 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.320063 kubelet[2485]: E0212 20:00:47.320047 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.320063 kubelet[2485]: W0212 20:00:47.320059 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.320313 kubelet[2485]: E0212 20:00:47.320078 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.320313 kubelet[2485]: E0212 20:00:47.320305 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.320426 kubelet[2485]: W0212 20:00:47.320316 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.320426 kubelet[2485]: E0212 20:00:47.320330 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.320688 kubelet[2485]: E0212 20:00:47.320672 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.320688 kubelet[2485]: W0212 20:00:47.320685 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.320907 kubelet[2485]: E0212 20:00:47.320869 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.320971 kubelet[2485]: E0212 20:00:47.320920 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.320971 kubelet[2485]: W0212 20:00:47.320928 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.320971 kubelet[2485]: E0212 20:00:47.320944 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.321183 kubelet[2485]: E0212 20:00:47.321167 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.321183 kubelet[2485]: W0212 20:00:47.321179 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.321340 kubelet[2485]: E0212 20:00:47.321193 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.321439 kubelet[2485]: E0212 20:00:47.321424 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.321439 kubelet[2485]: W0212 20:00:47.321438 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.321526 kubelet[2485]: E0212 20:00:47.321455 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.321814 kubelet[2485]: E0212 20:00:47.321798 2485 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:00:47.321814 kubelet[2485]: W0212 20:00:47.321810 2485 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:00:47.321920 kubelet[2485]: E0212 20:00:47.321826 2485 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:00:47.325803 env[1331]: time="2024-02-12T20:00:47.325764210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:47.331860 env[1331]: time="2024-02-12T20:00:47.331814663Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:47.338576 env[1331]: time="2024-02-12T20:00:47.338540422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:47.346781 env[1331]: time="2024-02-12T20:00:47.346743893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:47.347553 env[1331]: time="2024-02-12T20:00:47.347520600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:00:47.351423 env[1331]: time="2024-02-12T20:00:47.351391033Z" level=info msg="CreateContainer within sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:00:47.384921 env[1331]: time="2024-02-12T20:00:47.384857724Z" level=info msg="CreateContainer within sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\"" Feb 12 20:00:47.386888 env[1331]: time="2024-02-12T20:00:47.386851742Z" level=info msg="StartContainer for \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\"" Feb 12 20:00:47.416822 systemd[1]: run-containerd-runc-k8s.io-a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149-runc.tprfBY.mount: Deactivated successfully. Feb 12 20:00:47.419504 systemd[1]: Started cri-containerd-a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149.scope. Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f22a43ff208 items=0 ppid=3001 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:47.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363232343530653335306365373837653163363766346461646261 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit: BPF prog-id=148 op=LOAD Feb 12 20:00:47.435000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002ba7b8 items=0 ppid=3001 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:47.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363232343530653335306365373837653163363766346461646261 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit: BPF prog-id=149 op=LOAD Feb 12 20:00:47.435000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002ba808 items=0 ppid=3001 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:47.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363232343530653335306365373837653163363766346461646261 Feb 12 20:00:47.435000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:00:47.435000 audit: BPF prog-id=148 op=UNLOAD Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { perfmon } for pid=3499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit[3499]: AVC avc: denied { bpf } for pid=3499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:47.435000 audit: BPF prog-id=150 op=LOAD Feb 12 20:00:47.435000 audit[3499]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002ba898 items=0 ppid=3001 pid=3499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:47.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135363232343530653335306365373837653163363766346461646261 Feb 12 20:00:47.454463 env[1331]: time="2024-02-12T20:00:47.454411229Z" level=info msg="StartContainer for \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\" returns successfully" Feb 12 20:00:47.463795 systemd[1]: cri-containerd-a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149.scope: Deactivated successfully. Feb 12 20:00:47.467000 audit: BPF prog-id=150 op=UNLOAD Feb 12 20:00:47.667048 env[1331]: time="2024-02-12T20:00:47.666995779Z" level=info msg="shim disconnected" id=a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149 Feb 12 20:00:47.667048 env[1331]: time="2024-02-12T20:00:47.667043679Z" level=warning msg="cleaning up after shim disconnected" id=a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149 namespace=k8s.io Feb 12 20:00:47.667420 env[1331]: time="2024-02-12T20:00:47.667054379Z" level=info msg="cleaning up dead shim" Feb 12 20:00:47.674863 env[1331]: time="2024-02-12T20:00:47.674815247Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:00:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3539 runtime=io.containerd.runc.v2\n" Feb 12 20:00:48.087110 kubelet[2485]: E0212 20:00:48.086626 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:48.191487 env[1331]: time="2024-02-12T20:00:48.191443114Z" level=info msg="StopPodSandbox for \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\"" Feb 12 20:00:48.191790 env[1331]: time="2024-02-12T20:00:48.191756117Z" level=info msg="Container to stop \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 12 20:00:48.202000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:00:48.203718 systemd[1]: cri-containerd-77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391.scope: Deactivated successfully. Feb 12 20:00:48.206000 audit: BPF prog-id=135 op=UNLOAD Feb 12 20:00:48.242372 env[1331]: time="2024-02-12T20:00:48.242313850Z" level=info msg="shim disconnected" id=77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391 Feb 12 20:00:48.242372 env[1331]: time="2024-02-12T20:00:48.242363850Z" level=warning msg="cleaning up after shim disconnected" id=77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391 namespace=k8s.io Feb 12 20:00:48.242372 env[1331]: time="2024-02-12T20:00:48.242375350Z" level=info msg="cleaning up dead shim" Feb 12 20:00:48.250927 env[1331]: time="2024-02-12T20:00:48.250870623Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:00:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3570 runtime=io.containerd.runc.v2\n" Feb 12 20:00:48.251294 env[1331]: time="2024-02-12T20:00:48.251220126Z" level=info msg="TearDown network for sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" successfully" Feb 12 20:00:48.251294 env[1331]: time="2024-02-12T20:00:48.251270426Z" level=info msg="StopPodSandbox for \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" returns successfully" Feb 12 20:00:48.372410 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149-rootfs.mount: Deactivated successfully. Feb 12 20:00:48.372536 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391-rootfs.mount: Deactivated successfully. Feb 12 20:00:48.372613 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391-shm.mount: Deactivated successfully. Feb 12 20:00:48.427737 kubelet[2485]: I0212 20:00:48.427696 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-tigera-ca-bundle\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428354 kubelet[2485]: I0212 20:00:48.428331 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-run-calico\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428464 kubelet[2485]: I0212 20:00:48.428382 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-flexvol-driver-host\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428464 kubelet[2485]: I0212 20:00:48.428413 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-policysync\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428464 kubelet[2485]: I0212 20:00:48.428454 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-node-certs\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428636 kubelet[2485]: I0212 20:00:48.428486 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-lib-modules\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428636 kubelet[2485]: I0212 20:00:48.428528 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-2trlp\" (UniqueName: \"kubernetes.io/projected/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-kube-api-access-2trlp\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428636 kubelet[2485]: I0212 20:00:48.428559 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-log-dir\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428636 kubelet[2485]: I0212 20:00:48.428591 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-net-dir\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428636 kubelet[2485]: I0212 20:00:48.428626 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-bin-dir\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428905 kubelet[2485]: I0212 20:00:48.428658 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-lib-calico\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428905 kubelet[2485]: I0212 20:00:48.428700 2485 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-xtables-lock\") pod \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\" (UID: \"1e44c71e-f294-472e-bcbc-f44f1d5b6af4\") " Feb 12 20:00:48.428905 kubelet[2485]: I0212 20:00:48.428776 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.428905 kubelet[2485]: W0212 20:00:48.427930 2485 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/1e44c71e-f294-472e-bcbc-f44f1d5b6af4/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 12 20:00:48.429175 kubelet[2485]: I0212 20:00:48.429141 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 12 20:00:48.429307 kubelet[2485]: I0212 20:00:48.429192 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.430404 kubelet[2485]: I0212 20:00:48.429220 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.430404 kubelet[2485]: I0212 20:00:48.429593 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.430404 kubelet[2485]: I0212 20:00:48.429622 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.430404 kubelet[2485]: I0212 20:00:48.429645 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.430404 kubelet[2485]: I0212 20:00:48.429668 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.431017 kubelet[2485]: I0212 20:00:48.430837 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.431017 kubelet[2485]: I0212 20:00:48.430896 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-policysync" (OuterVolumeSpecName: "policysync") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 12 20:00:48.436362 systemd[1]: var-lib-kubelet-pods-1e44c71e\x2df294\x2d472e\x2dbcbc\x2df44f1d5b6af4-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 12 20:00:48.439889 systemd[1]: var-lib-kubelet-pods-1e44c71e\x2df294\x2d472e\x2dbcbc\x2df44f1d5b6af4-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d2trlp.mount: Deactivated successfully. Feb 12 20:00:48.440975 kubelet[2485]: I0212 20:00:48.440941 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-node-certs" (OuterVolumeSpecName: "node-certs") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 12 20:00:48.441085 kubelet[2485]: I0212 20:00:48.441059 2485 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-kube-api-access-2trlp" (OuterVolumeSpecName: "kube-api-access-2trlp") pod "1e44c71e-f294-472e-bcbc-f44f1d5b6af4" (UID: "1e44c71e-f294-472e-bcbc-f44f1d5b6af4"). InnerVolumeSpecName "kube-api-access-2trlp". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 12 20:00:48.529446 kubelet[2485]: I0212 20:00:48.529393 2485 reconciler_common.go:295] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-xtables-lock\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529446 kubelet[2485]: I0212 20:00:48.529446 2485 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-tigera-ca-bundle\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529464 2485 reconciler_common.go:295] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-run-calico\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529482 2485 reconciler_common.go:295] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-flexvol-driver-host\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529503 2485 reconciler_common.go:295] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-policysync\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529521 2485 reconciler_common.go:295] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-node-certs\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529536 2485 reconciler_common.go:295] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-lib-modules\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529553 2485 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-2trlp\" (UniqueName: \"kubernetes.io/projected/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-kube-api-access-2trlp\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529569 2485 reconciler_common.go:295] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-log-dir\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.529738 kubelet[2485]: I0212 20:00:48.529584 2485 reconciler_common.go:295] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-net-dir\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.530015 kubelet[2485]: I0212 20:00:48.529600 2485 reconciler_common.go:295] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-var-lib-calico\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:48.530015 kubelet[2485]: I0212 20:00:48.529616 2485 reconciler_common.go:295] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1e44c71e-f294-472e-bcbc-f44f1d5b6af4-cni-bin-dir\") on node \"ci-3510.3.2-a-996941d352\" DevicePath \"\"" Feb 12 20:00:49.193480 kubelet[2485]: I0212 20:00:49.193448 2485 scope.go:115] "RemoveContainer" containerID="a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149" Feb 12 20:00:49.196934 systemd[1]: Removed slice kubepods-besteffort-pod1e44c71e_f294_472e_bcbc_f44f1d5b6af4.slice. Feb 12 20:00:49.199078 env[1331]: time="2024-02-12T20:00:49.198917511Z" level=info msg="RemoveContainer for \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\"" Feb 12 20:00:49.212045 env[1331]: time="2024-02-12T20:00:49.211992021Z" level=info msg="RemoveContainer for \"a5622450e350ce787e1c67f4dadba431750ab4d29437edfa38c34d16caf5f149\" returns successfully" Feb 12 20:00:49.225443 kubelet[2485]: I0212 20:00:49.224467 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:00:49.225443 kubelet[2485]: E0212 20:00:49.224588 2485 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1e44c71e-f294-472e-bcbc-f44f1d5b6af4" containerName="flexvol-driver" Feb 12 20:00:49.225443 kubelet[2485]: I0212 20:00:49.224627 2485 memory_manager.go:346] "RemoveStaleState removing state" podUID="1e44c71e-f294-472e-bcbc-f44f1d5b6af4" containerName="flexvol-driver" Feb 12 20:00:49.230925 systemd[1]: Created slice kubepods-besteffort-pod88a902a7_e2a1_4f70_a619_10ea5fe4a800.slice. Feb 12 20:00:49.336190 kubelet[2485]: I0212 20:00:49.336137 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-cni-net-dir\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.336537 kubelet[2485]: I0212 20:00:49.336508 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-policysync\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.336666 kubelet[2485]: I0212 20:00:49.336651 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/88a902a7-e2a1-4f70-a619-10ea5fe4a800-tigera-ca-bundle\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.336758 kubelet[2485]: I0212 20:00:49.336694 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-var-run-calico\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.336866 kubelet[2485]: I0212 20:00:49.336847 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-flexvol-driver-host\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337000 kubelet[2485]: I0212 20:00:49.336945 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-lib-modules\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337087 kubelet[2485]: I0212 20:00:49.337058 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-xtables-lock\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337152 kubelet[2485]: I0212 20:00:49.337100 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-var-lib-calico\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337288 kubelet[2485]: I0212 20:00:49.337221 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-cni-log-dir\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337389 kubelet[2485]: I0212 20:00:49.337348 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-64tnj\" (UniqueName: \"kubernetes.io/projected/88a902a7-e2a1-4f70-a619-10ea5fe4a800-kube-api-access-64tnj\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337455 kubelet[2485]: I0212 20:00:49.337437 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/88a902a7-e2a1-4f70-a619-10ea5fe4a800-cni-bin-dir\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.337545 kubelet[2485]: I0212 20:00:49.337523 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/88a902a7-e2a1-4f70-a619-10ea5fe4a800-node-certs\") pod \"calico-node-h97kf\" (UID: \"88a902a7-e2a1-4f70-a619-10ea5fe4a800\") " pod="calico-system/calico-node-h97kf" Feb 12 20:00:49.536139 env[1331]: time="2024-02-12T20:00:49.535037742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h97kf,Uid:88a902a7-e2a1-4f70-a619-10ea5fe4a800,Namespace:calico-system,Attempt:0,}" Feb 12 20:00:49.578855 env[1331]: time="2024-02-12T20:00:49.578775011Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:00:49.578855 env[1331]: time="2024-02-12T20:00:49.578812911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:00:49.579174 env[1331]: time="2024-02-12T20:00:49.578827711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:00:49.579492 env[1331]: time="2024-02-12T20:00:49.579450117Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618 pid=3599 runtime=io.containerd.runc.v2 Feb 12 20:00:49.600983 systemd[1]: Started cri-containerd-bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618.scope. Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.615000 audit: BPF prog-id=151 op=LOAD Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3599 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266386235616466613763656434666233613362366235393238363933 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=3599 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266386235616466613763656434666233613362366235393238363933 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit: BPF prog-id=152 op=LOAD Feb 12 20:00:49.616000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0000a1520 items=0 ppid=3599 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266386235616466613763656434666233613362366235393238363933 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit: BPF prog-id=153 op=LOAD Feb 12 20:00:49.616000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000a1568 items=0 ppid=3599 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266386235616466613763656434666233613362366235393238363933 Feb 12 20:00:49.616000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:00:49.616000 audit: BPF prog-id=152 op=UNLOAD Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.616000 audit: BPF prog-id=154 op=LOAD Feb 12 20:00:49.616000 audit[3608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000a1978 items=0 ppid=3599 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266386235616466613763656434666233613362366235393238363933 Feb 12 20:00:49.631648 env[1331]: time="2024-02-12T20:00:49.631593056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h97kf,Uid:88a902a7-e2a1-4f70-a619-10ea5fe4a800,Namespace:calico-system,Attempt:0,} returns sandbox id \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\"" Feb 12 20:00:49.635708 env[1331]: time="2024-02-12T20:00:49.635664090Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:00:49.673619 env[1331]: time="2024-02-12T20:00:49.673567009Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1\"" Feb 12 20:00:49.678328 env[1331]: time="2024-02-12T20:00:49.675336624Z" level=info msg="StartContainer for \"356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1\"" Feb 12 20:00:49.703349 systemd[1]: Started cri-containerd-356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1.scope. Feb 12 20:00:49.746271 kernel: kauditd_printk_skb: 213 callbacks suppressed Feb 12 20:00:49.746456 kernel: audit: type=1400 audit(1707768049.731:1227): avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f20adfb2dd8 items=0 ppid=3599 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.772140 kernel: audit: type=1300 audit(1707768049.731:1227): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f20adfb2dd8 items=0 ppid=3599 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363132356465383265336632393838323762373364633338626239 Feb 12 20:00:49.793272 kernel: audit: type=1327 audit(1707768049.731:1227): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363132356465383265336632393838323762373364633338626239 Feb 12 20:00:49.796607 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.824258 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.841843 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.841929 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.843212 env[1331]: time="2024-02-12T20:00:49.843168038Z" level=info msg="StartContainer for \"356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1\" returns successfully" Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.866386 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.865642 systemd[1]: cri-containerd-356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1.scope: Deactivated successfully. Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.896463 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.896588 kernel: audit: type=1400 audit(1707768049.731:1228): avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit: BPF prog-id=155 op=LOAD Feb 12 20:00:49.731000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00037e7e8 items=0 ppid=3599 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363132356465383265336632393838323762373364633338626239 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit: BPF prog-id=156 op=LOAD Feb 12 20:00:49.731000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00037e838 items=0 ppid=3599 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363132356465383265336632393838323762373364633338626239 Feb 12 20:00:49.731000 audit: BPF prog-id=156 op=UNLOAD Feb 12 20:00:49.731000 audit: BPF prog-id=155 op=UNLOAD Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { perfmon } for pid=3639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit[3639]: AVC avc: denied { bpf } for pid=3639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:49.731000 audit: BPF prog-id=157 op=LOAD Feb 12 20:00:49.731000 audit[3639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00037e8c8 items=0 ppid=3599 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:49.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363132356465383265336632393838323762373364633338626239 Feb 12 20:00:49.897000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:00:49.962024 env[1331]: time="2024-02-12T20:00:49.961970939Z" level=info msg="shim disconnected" id=356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1 Feb 12 20:00:49.962024 env[1331]: time="2024-02-12T20:00:49.962019240Z" level=warning msg="cleaning up after shim disconnected" id=356125de82e3f298827b73dc38bb9b2d390cd25fd4a4207ae4f4129664314ce1 namespace=k8s.io Feb 12 20:00:49.962024 env[1331]: time="2024-02-12T20:00:49.962029740Z" level=info msg="cleaning up dead shim" Feb 12 20:00:49.972550 env[1331]: time="2024-02-12T20:00:49.972494528Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:00:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3679 runtime=io.containerd.runc.v2\n" Feb 12 20:00:50.086826 kubelet[2485]: E0212 20:00:50.086492 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:50.100863 kubelet[2485]: I0212 20:00:50.100827 2485 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=1e44c71e-f294-472e-bcbc-f44f1d5b6af4 path="/var/lib/kubelet/pods/1e44c71e-f294-472e-bcbc-f44f1d5b6af4/volumes" Feb 12 20:00:50.200432 env[1331]: time="2024-02-12T20:00:50.199768216Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:00:50.445059 systemd[1]: run-containerd-runc-k8s.io-bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618-runc.1WtBMy.mount: Deactivated successfully. Feb 12 20:00:52.087800 kubelet[2485]: E0212 20:00:52.087758 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:54.086821 kubelet[2485]: E0212 20:00:54.086438 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:56.087033 kubelet[2485]: E0212 20:00:56.086444 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:56.807000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:56.813363 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:00:56.813505 kernel: audit: type=1400 audit(1707768056.807:1235): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:56.807000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:56.847478 kernel: audit: type=1400 audit(1707768056.807:1234): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:56.847621 kernel: audit: type=1300 audit(1707768056.807:1235): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020628e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:56.807000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020628e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:56.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:56.889343 kernel: audit: type=1327 audit(1707768056.807:1235): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:56.889464 kernel: audit: type=1300 audit(1707768056.807:1234): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018c0e10 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:56.807000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0018c0e10 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:00:56.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:56.931832 kernel: audit: type=1327 audit(1707768056.807:1234): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:00:57.902000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.902000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0045b08a0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.948695 kernel: audit: type=1400 audit(1707768057.902:1236): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.948908 kernel: audit: type=1300 audit(1707768057.902:1236): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0045b08a0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.972072 kernel: audit: type=1327 audit(1707768057.902:1236): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.902000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.922000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.922000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0045b1d40 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.922000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.993251 kernel: audit: type=1400 audit(1707768057.922:1237): avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.922000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.922000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003593a00 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.922000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.928000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.928000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0100700f0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.933000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.933000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0100701e0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:57.933000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:00:57.933000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c003645b60 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:00:57.933000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:00:58.089039 kubelet[2485]: E0212 20:00:58.087051 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:00:58.952619 env[1331]: time="2024-02-12T20:00:58.952561718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:58.961526 env[1331]: time="2024-02-12T20:00:58.961471684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:58.967254 env[1331]: time="2024-02-12T20:00:58.967181526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:58.971490 env[1331]: time="2024-02-12T20:00:58.971450758Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:00:58.972223 env[1331]: time="2024-02-12T20:00:58.972176563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:00:58.977523 env[1331]: time="2024-02-12T20:00:58.977475802Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:00:59.024906 env[1331]: time="2024-02-12T20:00:59.024863550Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8\"" Feb 12 20:00:59.027515 env[1331]: time="2024-02-12T20:00:59.025525655Z" level=info msg="StartContainer for \"d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8\"" Feb 12 20:00:59.054148 systemd[1]: Started cri-containerd-d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8.scope. Feb 12 20:00:59.058951 systemd[1]: run-containerd-runc-k8s.io-d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8-runc.Ku5uU8.mount: Deactivated successfully. Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f2dd863ab40 items=0 ppid=3599 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:59.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432373338373661336165363633356135346434333539363334623866 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit: BPF prog-id=158 op=LOAD Feb 12 20:00:59.077000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00027f5a8 items=0 ppid=3599 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:59.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432373338373661336165363633356135346434333539363334623866 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit: BPF prog-id=159 op=LOAD Feb 12 20:00:59.077000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00027f5f8 items=0 ppid=3599 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:59.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432373338373661336165363633356135346434333539363334623866 Feb 12 20:00:59.077000 audit: BPF prog-id=159 op=UNLOAD Feb 12 20:00:59.077000 audit: BPF prog-id=158 op=UNLOAD Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:00:59.077000 audit: BPF prog-id=160 op=LOAD Feb 12 20:00:59.077000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00027f688 items=0 ppid=3599 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:00:59.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432373338373661336165363633356135346434333539363334623866 Feb 12 20:00:59.122979 env[1331]: time="2024-02-12T20:00:59.122928665Z" level=info msg="StartContainer for \"d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8\" returns successfully" Feb 12 20:01:00.087468 kubelet[2485]: E0212 20:01:00.086932 2485 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:01:01.124000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:01.124000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:01.124000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002063120 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:01.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:01.124000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020ef5a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:01.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:01.124000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:01.124000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020ef5c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:01.124000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:01.125000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:01.125000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002063340 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:01.125000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:01.190847 env[1331]: time="2024-02-12T20:01:01.190772004Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:01:01.193556 systemd[1]: cri-containerd-d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8.scope: Deactivated successfully. Feb 12 20:01:01.196000 audit: BPF prog-id=160 op=UNLOAD Feb 12 20:01:01.214008 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8-rootfs.mount: Deactivated successfully. Feb 12 20:01:01.271582 kubelet[2485]: I0212 20:01:01.271112 2485 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:01:01.291184 kubelet[2485]: I0212 20:01:01.291143 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:01:01.297774 kubelet[2485]: I0212 20:01:01.296513 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:01:01.297485 systemd[1]: Created slice kubepods-burstable-pod9acb1d2e_4b03_497d_9069_661e8dd819f2.slice. Feb 12 20:01:01.301881 kubelet[2485]: I0212 20:01:01.301453 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:01:01.600341 kubelet[2485]: I0212 20:01:01.425220 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-62hps\" (UniqueName: \"kubernetes.io/projected/26db85d3-fecd-4160-bd67-d63c2f2604e7-kube-api-access-62hps\") pod \"coredns-787d4945fb-tttbk\" (UID: \"26db85d3-fecd-4160-bd67-d63c2f2604e7\") " pod="kube-system/coredns-787d4945fb-tttbk" Feb 12 20:01:01.600341 kubelet[2485]: I0212 20:01:01.425353 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/26db85d3-fecd-4160-bd67-d63c2f2604e7-config-volume\") pod \"coredns-787d4945fb-tttbk\" (UID: \"26db85d3-fecd-4160-bd67-d63c2f2604e7\") " pod="kube-system/coredns-787d4945fb-tttbk" Feb 12 20:01:01.600341 kubelet[2485]: I0212 20:01:01.425413 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sdlff\" (UniqueName: \"kubernetes.io/projected/9acb1d2e-4b03-497d-9069-661e8dd819f2-kube-api-access-sdlff\") pod \"coredns-787d4945fb-cc8zf\" (UID: \"9acb1d2e-4b03-497d-9069-661e8dd819f2\") " pod="kube-system/coredns-787d4945fb-cc8zf" Feb 12 20:01:01.600341 kubelet[2485]: I0212 20:01:01.425473 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9acb1d2e-4b03-497d-9069-661e8dd819f2-config-volume\") pod \"coredns-787d4945fb-cc8zf\" (UID: \"9acb1d2e-4b03-497d-9069-661e8dd819f2\") " pod="kube-system/coredns-787d4945fb-cc8zf" Feb 12 20:01:01.600341 kubelet[2485]: I0212 20:01:01.425532 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9xbk9\" (UniqueName: \"kubernetes.io/projected/f16b1ff4-03e0-4c63-900d-663eb34e2e55-kube-api-access-9xbk9\") pod \"calico-kube-controllers-57ff975f4d-4l2gq\" (UID: \"f16b1ff4-03e0-4c63-900d-663eb34e2e55\") " pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" Feb 12 20:01:01.307296 systemd[1]: Created slice kubepods-burstable-pod26db85d3_fecd_4160_bd67_d63c2f2604e7.slice. Feb 12 20:01:01.600828 kubelet[2485]: I0212 20:01:01.425580 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f16b1ff4-03e0-4c63-900d-663eb34e2e55-tigera-ca-bundle\") pod \"calico-kube-controllers-57ff975f4d-4l2gq\" (UID: \"f16b1ff4-03e0-4c63-900d-663eb34e2e55\") " pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" Feb 12 20:01:01.312985 systemd[1]: Created slice kubepods-besteffort-podf16b1ff4_03e0_4c63_900d_663eb34e2e55.slice. Feb 12 20:01:01.897605 env[1331]: time="2024-02-12T20:01:01.897478722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-cc8zf,Uid:9acb1d2e-4b03-497d-9069-661e8dd819f2,Namespace:kube-system,Attempt:0,}" Feb 12 20:01:01.899952 env[1331]: time="2024-02-12T20:01:01.899908339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-tttbk,Uid:26db85d3-fecd-4160-bd67-d63c2f2604e7,Namespace:kube-system,Attempt:0,}" Feb 12 20:01:01.901839 env[1331]: time="2024-02-12T20:01:01.901795953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57ff975f4d-4l2gq,Uid:f16b1ff4-03e0-4c63-900d-663eb34e2e55,Namespace:calico-system,Attempt:0,}" Feb 12 20:01:02.015045 env[1331]: time="2024-02-12T20:01:02.015001255Z" level=info msg="StopPodSandbox for \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\"" Feb 12 20:01:02.015284 env[1331]: time="2024-02-12T20:01:02.015109656Z" level=info msg="TearDown network for sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" successfully" Feb 12 20:01:02.015284 env[1331]: time="2024-02-12T20:01:02.015157156Z" level=info msg="StopPodSandbox for \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" returns successfully" Feb 12 20:01:02.015594 env[1331]: time="2024-02-12T20:01:02.015555659Z" level=info msg="RemovePodSandbox for \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\"" Feb 12 20:01:02.015677 env[1331]: time="2024-02-12T20:01:02.015591960Z" level=info msg="Forcibly stopping sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\"" Feb 12 20:01:02.015722 env[1331]: time="2024-02-12T20:01:02.015685660Z" level=info msg="TearDown network for sandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" successfully" Feb 12 20:01:02.093939 systemd[1]: Created slice kubepods-besteffort-poddec3207f_864b_4d9d_b98a_dcf25643ac17.slice. Feb 12 20:01:02.097167 env[1331]: time="2024-02-12T20:01:02.097121231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f9rqg,Uid:dec3207f-864b-4d9d-b98a-dcf25643ac17,Namespace:calico-system,Attempt:0,}" Feb 12 20:01:02.455201 env[1331]: time="2024-02-12T20:01:02.455135841Z" level=info msg="shim disconnected" id=d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8 Feb 12 20:01:02.455751 env[1331]: time="2024-02-12T20:01:02.455721945Z" level=warning msg="cleaning up after shim disconnected" id=d273876a3ae6635a54d4359634b8fb7746395d42f06f05c9c8fff9cba8ec94a8 namespace=k8s.io Feb 12 20:01:02.455864 env[1331]: time="2024-02-12T20:01:02.455847646Z" level=info msg="cleaning up dead shim" Feb 12 20:01:02.462291 env[1331]: time="2024-02-12T20:01:02.462250391Z" level=info msg="RemovePodSandbox \"f8d9ce6347acb0ceacbaedf75beb5f9bbd5fd2484328ec817f2b883b3c673c98\" returns successfully" Feb 12 20:01:02.462723 env[1331]: time="2024-02-12T20:01:02.462691394Z" level=info msg="StopPodSandbox for \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\"" Feb 12 20:01:02.462822 env[1331]: time="2024-02-12T20:01:02.462777895Z" level=info msg="TearDown network for sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" successfully" Feb 12 20:01:02.462875 env[1331]: time="2024-02-12T20:01:02.462825395Z" level=info msg="StopPodSandbox for \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" returns successfully" Feb 12 20:01:02.463140 env[1331]: time="2024-02-12T20:01:02.463113297Z" level=info msg="RemovePodSandbox for \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\"" Feb 12 20:01:02.463221 env[1331]: time="2024-02-12T20:01:02.463150198Z" level=info msg="Forcibly stopping sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\"" Feb 12 20:01:02.463303 env[1331]: time="2024-02-12T20:01:02.463275098Z" level=info msg="TearDown network for sandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" successfully" Feb 12 20:01:02.482368 env[1331]: time="2024-02-12T20:01:02.482328932Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:01:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3760 runtime=io.containerd.runc.v2\n" Feb 12 20:01:02.502695 env[1331]: time="2024-02-12T20:01:02.502638174Z" level=info msg="RemovePodSandbox \"77975211938862a0a85b54101f535cb2e513bd725d9e861e01c0cfb71c92b391\" returns successfully" Feb 12 20:01:02.684124 env[1331]: time="2024-02-12T20:01:02.684048946Z" level=error msg="Failed to destroy network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.684585 env[1331]: time="2024-02-12T20:01:02.684540150Z" level=error msg="encountered an error cleaning up failed sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.684778 env[1331]: time="2024-02-12T20:01:02.684741651Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57ff975f4d-4l2gq,Uid:f16b1ff4-03e0-4c63-900d-663eb34e2e55,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.685469 kubelet[2485]: E0212 20:01:02.685441 2485 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.685847 kubelet[2485]: E0212 20:01:02.685520 2485 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" Feb 12 20:01:02.685847 kubelet[2485]: E0212 20:01:02.685553 2485 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" Feb 12 20:01:02.685847 kubelet[2485]: E0212 20:01:02.685634 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-57ff975f4d-4l2gq_calico-system(f16b1ff4-03e0-4c63-900d-663eb34e2e55)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-57ff975f4d-4l2gq_calico-system(f16b1ff4-03e0-4c63-900d-663eb34e2e55)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" podUID=f16b1ff4-03e0-4c63-900d-663eb34e2e55 Feb 12 20:01:02.723661 env[1331]: time="2024-02-12T20:01:02.722813818Z" level=error msg="Failed to destroy network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.723853 env[1331]: time="2024-02-12T20:01:02.723804425Z" level=error msg="encountered an error cleaning up failed sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.723926 env[1331]: time="2024-02-12T20:01:02.723877426Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-tttbk,Uid:26db85d3-fecd-4160-bd67-d63c2f2604e7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.724747 kubelet[2485]: E0212 20:01:02.724137 2485 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.724747 kubelet[2485]: E0212 20:01:02.724218 2485 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-tttbk" Feb 12 20:01:02.724747 kubelet[2485]: E0212 20:01:02.724279 2485 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-tttbk" Feb 12 20:01:02.725010 kubelet[2485]: E0212 20:01:02.724381 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-tttbk_kube-system(26db85d3-fecd-4160-bd67-d63c2f2604e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-tttbk_kube-system(26db85d3-fecd-4160-bd67-d63c2f2604e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-tttbk" podUID=26db85d3-fecd-4160-bd67-d63c2f2604e7 Feb 12 20:01:02.729381 env[1331]: time="2024-02-12T20:01:02.729340464Z" level=error msg="Failed to destroy network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.729664 env[1331]: time="2024-02-12T20:01:02.729630466Z" level=error msg="encountered an error cleaning up failed sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.729793 env[1331]: time="2024-02-12T20:01:02.729687366Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f9rqg,Uid:dec3207f-864b-4d9d-b98a-dcf25643ac17,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.730291 kubelet[2485]: E0212 20:01:02.729972 2485 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.730291 kubelet[2485]: E0212 20:01:02.730030 2485 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:01:02.730291 kubelet[2485]: E0212 20:01:02.730059 2485 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-f9rqg" Feb 12 20:01:02.730482 kubelet[2485]: E0212 20:01:02.730120 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-f9rqg_calico-system(dec3207f-864b-4d9d-b98a-dcf25643ac17)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-f9rqg_calico-system(dec3207f-864b-4d9d-b98a-dcf25643ac17)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:01:02.748775 env[1331]: time="2024-02-12T20:01:02.748721800Z" level=error msg="Failed to destroy network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.749096 env[1331]: time="2024-02-12T20:01:02.749059602Z" level=error msg="encountered an error cleaning up failed sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.749183 env[1331]: time="2024-02-12T20:01:02.749121103Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-cc8zf,Uid:9acb1d2e-4b03-497d-9069-661e8dd819f2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.749383 kubelet[2485]: E0212 20:01:02.749362 2485 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:02.749496 kubelet[2485]: E0212 20:01:02.749417 2485 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-cc8zf" Feb 12 20:01:02.749496 kubelet[2485]: E0212 20:01:02.749445 2485 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-cc8zf" Feb 12 20:01:02.749584 kubelet[2485]: E0212 20:01:02.749507 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-cc8zf_kube-system(9acb1d2e-4b03-497d-9069-661e8dd819f2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-cc8zf_kube-system(9acb1d2e-4b03-497d-9069-661e8dd819f2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-cc8zf" podUID=9acb1d2e-4b03-497d-9069-661e8dd819f2 Feb 12 20:01:03.227836 kubelet[2485]: I0212 20:01:03.227427 2485 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:03.228215 env[1331]: time="2024-02-12T20:01:03.228180142Z" level=info msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" Feb 12 20:01:03.229274 env[1331]: time="2024-02-12T20:01:03.228427344Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:01:03.236582 kubelet[2485]: I0212 20:01:03.236558 2485 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:03.237165 env[1331]: time="2024-02-12T20:01:03.237116504Z" level=info msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" Feb 12 20:01:03.243200 kubelet[2485]: I0212 20:01:03.243177 2485 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:03.243720 env[1331]: time="2024-02-12T20:01:03.243689949Z" level=info msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" Feb 12 20:01:03.245023 kubelet[2485]: I0212 20:01:03.245004 2485 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:03.246789 env[1331]: time="2024-02-12T20:01:03.246750871Z" level=info msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" Feb 12 20:01:03.285403 env[1331]: time="2024-02-12T20:01:03.285324238Z" level=error msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" failed" error="failed to destroy network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:03.285628 kubelet[2485]: E0212 20:01:03.285604 2485 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:03.285742 kubelet[2485]: E0212 20:01:03.285662 2485 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748} Feb 12 20:01:03.285742 kubelet[2485]: E0212 20:01:03.285711 2485 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dec3207f-864b-4d9d-b98a-dcf25643ac17\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:01:03.285936 kubelet[2485]: E0212 20:01:03.285751 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dec3207f-864b-4d9d-b98a-dcf25643ac17\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-f9rqg" podUID=dec3207f-864b-4d9d-b98a-dcf25643ac17 Feb 12 20:01:03.319403 env[1331]: time="2024-02-12T20:01:03.319335873Z" level=error msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" failed" error="failed to destroy network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:03.319929 kubelet[2485]: E0212 20:01:03.319744 2485 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:03.319929 kubelet[2485]: E0212 20:01:03.319794 2485 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9} Feb 12 20:01:03.319929 kubelet[2485]: E0212 20:01:03.319844 2485 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9acb1d2e-4b03-497d-9069-661e8dd819f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:01:03.319929 kubelet[2485]: E0212 20:01:03.319886 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9acb1d2e-4b03-497d-9069-661e8dd819f2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-cc8zf" podUID=9acb1d2e-4b03-497d-9069-661e8dd819f2 Feb 12 20:01:03.333882 env[1331]: time="2024-02-12T20:01:03.333825574Z" level=error msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" failed" error="failed to destroy network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:03.334123 kubelet[2485]: E0212 20:01:03.334103 2485 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:03.334241 kubelet[2485]: E0212 20:01:03.334151 2485 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b} Feb 12 20:01:03.334241 kubelet[2485]: E0212 20:01:03.334197 2485 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"26db85d3-fecd-4160-bd67-d63c2f2604e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:01:03.334396 kubelet[2485]: E0212 20:01:03.334248 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"26db85d3-fecd-4160-bd67-d63c2f2604e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-tttbk" podUID=26db85d3-fecd-4160-bd67-d63c2f2604e7 Feb 12 20:01:03.337779 env[1331]: time="2024-02-12T20:01:03.337722700Z" level=error msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" failed" error="failed to destroy network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:01:03.337992 kubelet[2485]: E0212 20:01:03.337966 2485 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:03.338087 kubelet[2485]: E0212 20:01:03.338018 2485 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38} Feb 12 20:01:03.338087 kubelet[2485]: E0212 20:01:03.338061 2485 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f16b1ff4-03e0-4c63-900d-663eb34e2e55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:01:03.338208 kubelet[2485]: E0212 20:01:03.338097 2485 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f16b1ff4-03e0-4c63-900d-663eb34e2e55\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" podUID=f16b1ff4-03e0-4c63-900d-663eb34e2e55 Feb 12 20:01:03.536284 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38-shm.mount: Deactivated successfully. Feb 12 20:01:03.536446 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9-shm.mount: Deactivated successfully. Feb 12 20:01:03.536550 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b-shm.mount: Deactivated successfully. Feb 12 20:01:11.960511 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4099650685.mount: Deactivated successfully. Feb 12 20:01:12.083187 env[1331]: time="2024-02-12T20:01:12.083135504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:12.088199 env[1331]: time="2024-02-12T20:01:12.088154535Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:12.092266 env[1331]: time="2024-02-12T20:01:12.092211461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:12.099943 env[1331]: time="2024-02-12T20:01:12.099901509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:12.100482 env[1331]: time="2024-02-12T20:01:12.100446912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:01:12.117751 env[1331]: time="2024-02-12T20:01:12.117703620Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:01:12.149265 env[1331]: time="2024-02-12T20:01:12.149184317Z" level=info msg="CreateContainer within sandbox \"bf8b5adfa7ced4fb3a3b6b59286935f0d3141af88c0807ab6c76f08de287b618\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee\"" Feb 12 20:01:12.151915 env[1331]: time="2024-02-12T20:01:12.150125223Z" level=info msg="StartContainer for \"8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee\"" Feb 12 20:01:12.169509 systemd[1]: Started cri-containerd-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee.scope. Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.193895 kernel: kauditd_printk_skb: 70 callbacks suppressed Feb 12 20:01:12.194004 kernel: audit: type=1400 audit(1707768072.187:1253): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa90a54b230 items=0 ppid=3599 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:12.229154 kernel: audit: type=1300 audit(1707768072.187:1253): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa90a54b230 items=0 ppid=3599 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:12.229340 kernel: audit: type=1327 audit(1707768072.187:1253): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383835363863373461363831383739646366343164613162616337 Feb 12 20:01:12.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383835363863373461363831383739646366343164613162616337 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.265292 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.285254 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.299934 env[1331]: time="2024-02-12T20:01:12.299902861Z" level=info msg="StartContainer for \"8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee\" returns successfully" Feb 12 20:01:12.314202 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.314321 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.314352 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.343176 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.357353 kernel: audit: type=1400 audit(1707768072.187:1254): avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.187000 audit: BPF prog-id=161 op=LOAD Feb 12 20:01:12.187000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00039e8f8 items=0 ppid=3599 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:12.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383835363863373461363831383739646366343164613162616337 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.230000 audit: BPF prog-id=162 op=LOAD Feb 12 20:01:12.230000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00039e948 items=0 ppid=3599 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:12.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383835363863373461363831383739646366343164613162616337 Feb 12 20:01:12.247000 audit: BPF prog-id=162 op=UNLOAD Feb 12 20:01:12.247000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:12.247000 audit: BPF prog-id=163 op=LOAD Feb 12 20:01:12.247000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00039e9d8 items=0 ppid=3599 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:12.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834383835363863373461363831383739646366343164613162616337 Feb 12 20:01:12.615462 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:01:12.615640 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:01:13.295291 kubelet[2485]: I0212 20:01:13.293125 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-h97kf" podStartSLOduration=-9.2233720125617e+09 pod.CreationTimestamp="2024-02-12 20:00:49 +0000 UTC" firstStartedPulling="2024-02-12 20:00:50.199366513 +0000 UTC m=+48.351002290" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:13.291310148 +0000 UTC m=+71.442945925" watchObservedRunningTime="2024-02-12 20:01:13.293075259 +0000 UTC m=+71.444711036" Feb 12 20:01:13.300028 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.0b8VJ8.mount: Deactivated successfully. Feb 12 20:01:14.025000 audit[4107]: AVC avc: denied { write } for pid=4107 comm="tee" name="fd" dev="proc" ino=33565 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.025000 audit[4107]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0ee05973 a2=241 a3=1b6 items=1 ppid=4083 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.025000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:01:14.025000 audit: PATH item=0 name="/dev/fd/63" inode=33547 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.025000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.042000 audit[4115]: AVC avc: denied { write } for pid=4115 comm="tee" name="fd" dev="proc" ino=33572 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.042000 audit[4115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe07bb0971 a2=241 a3=1b6 items=1 ppid=4081 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.042000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:01:14.042000 audit: PATH item=0 name="/dev/fd/63" inode=33552 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.042000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.043000 audit[4119]: AVC avc: denied { write } for pid=4119 comm="tee" name="fd" dev="proc" ino=33576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.043000 audit[4119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd69d0972 a2=241 a3=1b6 items=1 ppid=4080 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.043000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:01:14.043000 audit: PATH item=0 name="/dev/fd/63" inode=33557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.046000 audit[4127]: AVC avc: denied { write } for pid=4127 comm="tee" name="fd" dev="proc" ino=33581 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.046000 audit[4127]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfc7eb962 a2=241 a3=1b6 items=1 ppid=4085 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.046000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:01:14.046000 audit: PATH item=0 name="/dev/fd/63" inode=33562 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.046000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.053000 audit[4132]: AVC avc: denied { write } for pid=4132 comm="tee" name="fd" dev="proc" ino=33588 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.053000 audit[4132]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5be5b961 a2=241 a3=1b6 items=1 ppid=4088 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.053000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:01:14.053000 audit: PATH item=0 name="/dev/fd/63" inode=33569 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.053000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.058000 audit[4139]: AVC avc: denied { write } for pid=4139 comm="tee" name="fd" dev="proc" ino=33598 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.058000 audit[4139]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd648a3971 a2=241 a3=1b6 items=1 ppid=4089 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.058000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:01:14.058000 audit: PATH item=0 name="/dev/fd/63" inode=33578 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.058000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.091000 audit[4144]: AVC avc: denied { write } for pid=4144 comm="tee" name="fd" dev="proc" ino=34334 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:01:14.091000 audit[4144]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc1c97971 a2=241 a3=1b6 items=1 ppid=4078 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.091000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:01:14.091000 audit: PATH item=0 name="/dev/fd/63" inode=33592 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:01:14.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.499000 audit: BPF prog-id=164 op=LOAD Feb 12 20:01:14.499000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff191bc390 a2=70 a3=7f2a87c26000 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.499000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.500000 audit: BPF prog-id=164 op=UNLOAD Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.500000 audit: BPF prog-id=165 op=LOAD Feb 12 20:01:14.500000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff191bc390 a2=70 a3=6e items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.501000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:01:14.501000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.501000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff191bc340 a2=70 a3=7fff191bc390 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.502000 audit: BPF prog-id=166 op=LOAD Feb 12 20:01:14.502000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff191bc320 a2=70 a3=7fff191bc390 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.503000 audit: BPF prog-id=166 op=UNLOAD Feb 12 20:01:14.503000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.503000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff191bc400 a2=70 a3=0 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.503000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.503000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff191bc3f0 a2=70 a3=0 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.503000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.503000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff191bc430 a2=70 a3=0 items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { perfmon } for pid=4239 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit[4239]: AVC avc: denied { bpf } for pid=4239 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.504000 audit: BPF prog-id=167 op=LOAD Feb 12 20:01:14.504000 audit[4239]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff191bc350 a2=70 a3=ffffffff items=0 ppid=4090 pid=4239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:01:14.509000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.509000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff491f68e0 a2=70 a3=fff80800 items=0 ppid=4090 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.509000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:01:14.509000 audit[4241]: AVC avc: denied { bpf } for pid=4241 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:14.509000 audit[4241]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff491f67b0 a2=70 a3=3 items=0 ppid=4090 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.509000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:01:14.516000 audit: BPF prog-id=167 op=UNLOAD Feb 12 20:01:14.657000 audit[4267]: NETFILTER_CFG table=mangle:121 family=2 entries=19 op=nft_register_chain pid=4267 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:14.657000 audit[4267]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd9ff90cb0 a2=0 a3=7ffd9ff90c9c items=0 ppid=4090 pid=4267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:14.664000 audit[4269]: NETFILTER_CFG table=nat:122 family=2 entries=16 op=nft_register_chain pid=4269 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:14.664000 audit[4269]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff28d97f50 a2=0 a3=5648fa3a9000 items=0 ppid=4090 pid=4269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.664000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:14.667000 audit[4274]: NETFILTER_CFG table=filter:123 family=2 entries=39 op=nft_register_chain pid=4274 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:14.667000 audit[4274]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc42aaa6a0 a2=0 a3=5636e46e9000 items=0 ppid=4090 pid=4274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:14.704000 audit[4268]: NETFILTER_CFG table=raw:124 family=2 entries=19 op=nft_register_chain pid=4268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:14.704000 audit[4268]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffdc1447990 a2=0 a3=561336e73000 items=0 ppid=4090 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:14.704000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:15.435931 systemd-networkd[1482]: vxlan.calico: Link UP Feb 12 20:01:15.435941 systemd-networkd[1482]: vxlan.calico: Gained carrier Feb 12 20:01:16.997444 systemd-networkd[1482]: vxlan.calico: Gained IPv6LL Feb 12 20:01:17.087553 env[1331]: time="2024-02-12T20:01:17.087488192Z" level=info msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" Feb 12 20:01:17.088126 env[1331]: time="2024-02-12T20:01:17.088087495Z" level=info msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.164 [INFO][4318] k8s.go 578: Cleaning up netns ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.165 [INFO][4318] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" iface="eth0" netns="/var/run/netns/cni-260e7a3a-9517-a150-3d3b-f797adeeb904" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.165 [INFO][4318] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" iface="eth0" netns="/var/run/netns/cni-260e7a3a-9517-a150-3d3b-f797adeeb904" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.165 [INFO][4318] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" iface="eth0" netns="/var/run/netns/cni-260e7a3a-9517-a150-3d3b-f797adeeb904" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.165 [INFO][4318] k8s.go 585: Releasing IP address(es) ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.165 [INFO][4318] utils.go 188: Calico CNI releasing IP address ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.197 [INFO][4332] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.197 [INFO][4332] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.197 [INFO][4332] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.207 [WARNING][4332] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.207 [INFO][4332] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.211 [INFO][4332] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:17.213654 env[1331]: 2024-02-12 20:01:17.212 [INFO][4318] k8s.go 591: Teardown processing complete. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:01:17.217434 systemd[1]: run-netns-cni\x2d260e7a3a\x2d9517\x2da150\x2d3d3b\x2df797adeeb904.mount: Deactivated successfully. Feb 12 20:01:17.221686 env[1331]: time="2024-02-12T20:01:17.220355184Z" level=info msg="TearDown network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" successfully" Feb 12 20:01:17.221686 env[1331]: time="2024-02-12T20:01:17.220395984Z" level=info msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" returns successfully" Feb 12 20:01:17.222475 env[1331]: time="2024-02-12T20:01:17.222445397Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57ff975f4d-4l2gq,Uid:f16b1ff4-03e0-4c63-900d-663eb34e2e55,Namespace:calico-system,Attempt:1,}" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.155 [INFO][4310] k8s.go 578: Cleaning up netns ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.155 [INFO][4310] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" iface="eth0" netns="/var/run/netns/cni-d434e0a9-6e60-f4ab-ce32-1fd45dbdaefd" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.155 [INFO][4310] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" iface="eth0" netns="/var/run/netns/cni-d434e0a9-6e60-f4ab-ce32-1fd45dbdaefd" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.155 [INFO][4310] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" iface="eth0" netns="/var/run/netns/cni-d434e0a9-6e60-f4ab-ce32-1fd45dbdaefd" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.155 [INFO][4310] k8s.go 585: Releasing IP address(es) ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.156 [INFO][4310] utils.go 188: Calico CNI releasing IP address ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.213 [INFO][4327] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.214 [INFO][4327] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.214 [INFO][4327] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.225 [WARNING][4327] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.225 [INFO][4327] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.227 [INFO][4327] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:17.231426 env[1331]: 2024-02-12 20:01:17.229 [INFO][4310] k8s.go 591: Teardown processing complete. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:01:17.234302 systemd[1]: run-netns-cni\x2dd434e0a9\x2d6e60\x2df4ab\x2dce32\x2d1fd45dbdaefd.mount: Deactivated successfully. Feb 12 20:01:17.236372 env[1331]: time="2024-02-12T20:01:17.236338679Z" level=info msg="TearDown network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" successfully" Feb 12 20:01:17.236489 env[1331]: time="2024-02-12T20:01:17.236471280Z" level=info msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" returns successfully" Feb 12 20:01:17.237144 env[1331]: time="2024-02-12T20:01:17.237114384Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-tttbk,Uid:26db85d3-fecd-4160-bd67-d63c2f2604e7,Namespace:kube-system,Attempt:1,}" Feb 12 20:01:17.427985 systemd-networkd[1482]: cali5d40b1b13af: Link UP Feb 12 20:01:17.440798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:01:17.440910 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d40b1b13af: link becomes ready Feb 12 20:01:17.442695 systemd-networkd[1482]: cali5d40b1b13af: Gained carrier Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.337 [INFO][4340] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0 calico-kube-controllers-57ff975f4d- calico-system f16b1ff4-03e0-4c63-900d-663eb34e2e55 854 0 2024-02-12 20:00:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:57ff975f4d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 calico-kube-controllers-57ff975f4d-4l2gq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5d40b1b13af [] []}} ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.337 [INFO][4340] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.383 [INFO][4363] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" HandleID="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.396 [INFO][4363] ipam_plugin.go 268: Auto assigning IP ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" HandleID="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d950), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-996941d352", "pod":"calico-kube-controllers-57ff975f4d-4l2gq", "timestamp":"2024-02-12 20:01:17.383780959 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.397 [INFO][4363] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.397 [INFO][4363] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.397 [INFO][4363] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.401 [INFO][4363] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.405 [INFO][4363] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.408 [INFO][4363] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.409 [INFO][4363] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.411 [INFO][4363] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.411 [INFO][4363] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.412 [INFO][4363] ipam.go 1682: Creating new handle: k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7 Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.415 [INFO][4363] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.419 [INFO][4363] ipam.go 1216: Successfully claimed IPs: [192.168.61.193/26] block=192.168.61.192/26 handle="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.419 [INFO][4363] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.193/26] handle="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.419 [INFO][4363] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:17.457547 env[1331]: 2024-02-12 20:01:17.419 [INFO][4363] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.193/26] IPv6=[] ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" HandleID="k8s-pod-network.ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.421 [INFO][4340] k8s.go 385: Populated endpoint ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0", GenerateName:"calico-kube-controllers-57ff975f4d-", Namespace:"calico-system", SelfLink:"", UID:"f16b1ff4-03e0-4c63-900d-663eb34e2e55", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57ff975f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"calico-kube-controllers-57ff975f4d-4l2gq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d40b1b13af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.421 [INFO][4340] k8s.go 386: Calico CNI using IPs: [192.168.61.193/32] ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.421 [INFO][4340] dataplane_linux.go 68: Setting the host side veth name to cali5d40b1b13af ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.444 [INFO][4340] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.445 [INFO][4340] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0", GenerateName:"calico-kube-controllers-57ff975f4d-", Namespace:"calico-system", SelfLink:"", UID:"f16b1ff4-03e0-4c63-900d-663eb34e2e55", ResourceVersion:"854", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57ff975f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7", Pod:"calico-kube-controllers-57ff975f4d-4l2gq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d40b1b13af", MAC:"6a:1b:e7:a7:4c:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:17.458575 env[1331]: 2024-02-12 20:01:17.454 [INFO][4340] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7" Namespace="calico-system" Pod="calico-kube-controllers-57ff975f4d-4l2gq" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:01:17.482702 systemd-networkd[1482]: calic4ac1a49ee9: Link UP Feb 12 20:01:17.490579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic4ac1a49ee9: link becomes ready Feb 12 20:01:17.491044 systemd-networkd[1482]: calic4ac1a49ee9: Gained carrier Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.351 [INFO][4352] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0 coredns-787d4945fb- kube-system 26db85d3-fecd-4160-bd67-d63c2f2604e7 853 0 2024-02-12 20:00:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 coredns-787d4945fb-tttbk eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic4ac1a49ee9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.351 [INFO][4352] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.397 [INFO][4367] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" HandleID="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.407 [INFO][4367] ipam_plugin.go 268: Auto assigning IP ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" HandleID="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002aca90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-996941d352", "pod":"coredns-787d4945fb-tttbk", "timestamp":"2024-02-12 20:01:17.397721642 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.407 [INFO][4367] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.419 [INFO][4367] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.419 [INFO][4367] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.424 [INFO][4367] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.427 [INFO][4367] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.441 [INFO][4367] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.447 [INFO][4367] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.461 [INFO][4367] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.461 [INFO][4367] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.463 [INFO][4367] ipam.go 1682: Creating new handle: k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95 Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.468 [INFO][4367] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.476 [INFO][4367] ipam.go 1216: Successfully claimed IPs: [192.168.61.194/26] block=192.168.61.192/26 handle="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.476 [INFO][4367] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.194/26] handle="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.476 [INFO][4367] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:17.507417 env[1331]: 2024-02-12 20:01:17.476 [INFO][4367] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.194/26] IPv6=[] ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" HandleID="k8s-pod-network.0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.479 [INFO][4352] k8s.go 385: Populated endpoint ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"26db85d3-fecd-4160-bd67-d63c2f2604e7", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"coredns-787d4945fb-tttbk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic4ac1a49ee9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.479 [INFO][4352] k8s.go 386: Calico CNI using IPs: [192.168.61.194/32] ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.479 [INFO][4352] dataplane_linux.go 68: Setting the host side veth name to calic4ac1a49ee9 ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.492 [INFO][4352] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.492 [INFO][4352] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"26db85d3-fecd-4160-bd67-d63c2f2604e7", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95", Pod:"coredns-787d4945fb-tttbk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic4ac1a49ee9", MAC:"5e:2c:ff:68:a9:60", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:17.508100 env[1331]: 2024-02-12 20:01:17.506 [INFO][4352] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95" Namespace="kube-system" Pod="coredns-787d4945fb-tttbk" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:01:17.511575 env[1331]: time="2024-02-12T20:01:17.511203119Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:17.511575 env[1331]: time="2024-02-12T20:01:17.511314619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:17.511575 env[1331]: time="2024-02-12T20:01:17.511332819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:17.511575 env[1331]: time="2024-02-12T20:01:17.511503620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7 pid=4397 runtime=io.containerd.runc.v2 Feb 12 20:01:17.532157 systemd[1]: Started cri-containerd-ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7.scope. Feb 12 20:01:17.551812 env[1331]: time="2024-02-12T20:01:17.551730560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:17.552012 env[1331]: time="2024-02-12T20:01:17.551832461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:17.552012 env[1331]: time="2024-02-12T20:01:17.551862761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:17.552116 env[1331]: time="2024-02-12T20:01:17.552037762Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95 pid=4433 runtime=io.containerd.runc.v2 Feb 12 20:01:17.581115 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 20:01:17.581286 kernel: audit: type=1400 audit(1707768077.559:1284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.598272 kernel: audit: type=1400 audit(1707768077.559:1285): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.601320 systemd[1]: Started cri-containerd-0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95.scope. Feb 12 20:01:17.615312 kernel: audit: type=1400 audit(1707768077.559:1286): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.637253 kernel: audit: type=1400 audit(1707768077.559:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.663616 kernel: audit: type=1400 audit(1707768077.559:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.663730 kernel: audit: type=1400 audit(1707768077.559:1289): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.663753 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:01:17.688511 kernel: audit: type=1400 audit(1707768077.559:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.688645 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:01:17.688677 kernel: audit: backlog limit exceeded Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.559000 audit: BPF prog-id=168 op=LOAD Feb 12 20:01:17.560000 audit[4445]: NETFILTER_CFG table=filter:125 family=2 entries=36 op=nft_register_chain pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:17.560000 audit[4445]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd76600ef0 a2=0 a3=7ffd76600edc items=0 ppid=4090 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.560000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:17.580000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.580000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4397 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666343133663333646635306630633664346161363232386639323330 Feb 12 20:01:17.580000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.580000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4397 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666343133663333646635306630633664346161363232386639323330 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit: BPF prog-id=169 op=LOAD Feb 12 20:01:17.581000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a5fe0 items=0 ppid=4397 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666343133663333646635306630633664346161363232386639323330 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit: BPF prog-id=170 op=LOAD Feb 12 20:01:17.581000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000390028 items=0 ppid=4397 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666343133663333646635306630633664346161363232386639323330 Feb 12 20:01:17.581000 audit: BPF prog-id=170 op=UNLOAD Feb 12 20:01:17.581000 audit: BPF prog-id=169 op=UNLOAD Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { perfmon } for pid=4412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit[4412]: AVC avc: denied { bpf } for pid=4412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.581000 audit: BPF prog-id=171 op=LOAD Feb 12 20:01:17.581000 audit[4412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000390438 items=0 ppid=4397 pid=4412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666343133663333646635306630633664346161363232386639323330 Feb 12 20:01:17.592000 audit[4462]: NETFILTER_CFG table=filter:126 family=2 entries=40 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:17.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.592000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffefa0fadf0 a2=0 a3=7ffefa0faddc items=0 ppid=4090 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.592000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:17.707784 env[1331]: time="2024-02-12T20:01:17.707412489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-57ff975f4d-4l2gq,Uid:f16b1ff4-03e0-4c63-900d-663eb34e2e55,Namespace:calico-system,Attempt:1,} returns sandbox id \"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7\"" Feb 12 20:01:17.709714 env[1331]: time="2024-02-12T20:01:17.709676402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:01:17.733026 env[1331]: time="2024-02-12T20:01:17.732981441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-tttbk,Uid:26db85d3-fecd-4160-bd67-d63c2f2604e7,Namespace:kube-system,Attempt:1,} returns sandbox id \"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95\"" Feb 12 20:01:17.736481 env[1331]: time="2024-02-12T20:01:17.736434162Z" level=info msg="CreateContainer within sandbox \"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:01:17.781934 env[1331]: time="2024-02-12T20:01:17.781880733Z" level=info msg="CreateContainer within sandbox \"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"363879856fb3e64ffac6e7f74d543b0cc67552b3f3829cf511034012e0731ab8\"" Feb 12 20:01:17.784283 env[1331]: time="2024-02-12T20:01:17.782802838Z" level=info msg="StartContainer for \"363879856fb3e64ffac6e7f74d543b0cc67552b3f3829cf511034012e0731ab8\"" Feb 12 20:01:17.800133 systemd[1]: Started cri-containerd-363879856fb3e64ffac6e7f74d543b0cc67552b3f3829cf511034012e0731ab8.scope. Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.815000 audit: BPF prog-id=176 op=LOAD Feb 12 20:01:17.815000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.815000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4433 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333837393835366662336536346666616336653766373464353433 Feb 12 20:01:17.815000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.815000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4433 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333837393835366662336536346666616336653766373464353433 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit: BPF prog-id=177 op=LOAD Feb 12 20:01:17.816000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025ae20 items=0 ppid=4433 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333837393835366662336536346666616336653766373464353433 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.816000 audit: BPF prog-id=178 op=LOAD Feb 12 20:01:17.816000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025ae68 items=0 ppid=4433 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333837393835366662336536346666616336653766373464353433 Feb 12 20:01:17.817000 audit: BPF prog-id=178 op=UNLOAD Feb 12 20:01:17.817000 audit: BPF prog-id=177 op=UNLOAD Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:17.817000 audit: BPF prog-id=179 op=LOAD Feb 12 20:01:17.817000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025b278 items=0 ppid=4433 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:17.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336333837393835366662336536346666616336653766373464353433 Feb 12 20:01:17.837037 env[1331]: time="2024-02-12T20:01:17.836966761Z" level=info msg="StartContainer for \"363879856fb3e64ffac6e7f74d543b0cc67552b3f3829cf511034012e0731ab8\" returns successfully" Feb 12 20:01:18.088438 env[1331]: time="2024-02-12T20:01:18.088379956Z" level=info msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.143 [INFO][4538] k8s.go 578: Cleaning up netns ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.143 [INFO][4538] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" iface="eth0" netns="/var/run/netns/cni-0ac64c81-51b8-6f59-2539-37225dcf6db1" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.145 [INFO][4538] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" iface="eth0" netns="/var/run/netns/cni-0ac64c81-51b8-6f59-2539-37225dcf6db1" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.145 [INFO][4538] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" iface="eth0" netns="/var/run/netns/cni-0ac64c81-51b8-6f59-2539-37225dcf6db1" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.146 [INFO][4538] k8s.go 585: Releasing IP address(es) ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.146 [INFO][4538] utils.go 188: Calico CNI releasing IP address ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.168 [INFO][4544] ipam_plugin.go 415: Releasing address using handleID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.168 [INFO][4544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.168 [INFO][4544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.174 [WARNING][4544] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.174 [INFO][4544] ipam_plugin.go 443: Releasing address using workloadID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.175 [INFO][4544] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:18.177641 env[1331]: 2024-02-12 20:01:18.176 [INFO][4538] k8s.go 591: Teardown processing complete. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:01:18.178339 env[1331]: time="2024-02-12T20:01:18.178289787Z" level=info msg="TearDown network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" successfully" Feb 12 20:01:18.178339 env[1331]: time="2024-02-12T20:01:18.178336688Z" level=info msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" returns successfully" Feb 12 20:01:18.179093 env[1331]: time="2024-02-12T20:01:18.179058692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f9rqg,Uid:dec3207f-864b-4d9d-b98a-dcf25643ac17,Namespace:calico-system,Attempt:1,}" Feb 12 20:01:18.223432 systemd[1]: run-netns-cni\x2d0ac64c81\x2d51b8\x2d6f59\x2d2539\x2d37225dcf6db1.mount: Deactivated successfully. Feb 12 20:01:18.315808 kubelet[2485]: I0212 20:01:18.315425 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-tttbk" podStartSLOduration=64.315363697 pod.CreationTimestamp="2024-02-12 20:00:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:18.298655699 +0000 UTC m=+76.450291476" watchObservedRunningTime="2024-02-12 20:01:18.315363697 +0000 UTC m=+76.466999474" Feb 12 20:01:18.366961 systemd-networkd[1482]: cali17201d2afaf: Link UP Feb 12 20:01:18.376855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17201d2afaf: link becomes ready Feb 12 20:01:18.378858 systemd-networkd[1482]: cali17201d2afaf: Gained carrier Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.254 [INFO][4551] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0 csi-node-driver- calico-system dec3207f-864b-4d9d-b98a-dcf25643ac17 868 0 2024-02-12 20:00:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 csi-node-driver-f9rqg eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali17201d2afaf [] []}} ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.254 [INFO][4551] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.292 [INFO][4563] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" HandleID="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.308 [INFO][4563] ipam_plugin.go 268: Auto assigning IP ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" HandleID="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f0eb0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-996941d352", "pod":"csi-node-driver-f9rqg", "timestamp":"2024-02-12 20:01:18.292565563 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.309 [INFO][4563] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.309 [INFO][4563] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.309 [INFO][4563] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.310 [INFO][4563] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.320 [INFO][4563] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.332 [INFO][4563] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.337 [INFO][4563] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.340 [INFO][4563] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.340 [INFO][4563] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.351 [INFO][4563] ipam.go 1682: Creating new handle: k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.356 [INFO][4563] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.362 [INFO][4563] ipam.go 1216: Successfully claimed IPs: [192.168.61.195/26] block=192.168.61.192/26 handle="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.362 [INFO][4563] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.195/26] handle="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.362 [INFO][4563] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:18.395913 env[1331]: 2024-02-12 20:01:18.362 [INFO][4563] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.195/26] IPv6=[] ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" HandleID="k8s-pod-network.bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.364 [INFO][4551] k8s.go 385: Populated endpoint ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dec3207f-864b-4d9d-b98a-dcf25643ac17", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"csi-node-driver-f9rqg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17201d2afaf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.364 [INFO][4551] k8s.go 386: Calico CNI using IPs: [192.168.61.195/32] ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.364 [INFO][4551] dataplane_linux.go 68: Setting the host side veth name to cali17201d2afaf ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.379 [INFO][4551] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.381 [INFO][4551] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dec3207f-864b-4d9d-b98a-dcf25643ac17", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf", Pod:"csi-node-driver-f9rqg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17201d2afaf", MAC:"de:76:1c:21:d5:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:18.396687 env[1331]: 2024-02-12 20:01:18.394 [INFO][4551] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf" Namespace="calico-system" Pod="csi-node-driver-f9rqg" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:01:18.409000 audit[4605]: NETFILTER_CFG table=filter:127 family=2 entries=12 op=nft_register_rule pid=4605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:18.409000 audit[4605]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd63474600 a2=0 a3=7ffd634745ec items=0 ppid=2681 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:18.416651 env[1331]: time="2024-02-12T20:01:18.416569796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:18.416839 env[1331]: time="2024-02-12T20:01:18.416616996Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:18.416839 env[1331]: time="2024-02-12T20:01:18.416631296Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:18.417000 env[1331]: time="2024-02-12T20:01:18.416975198Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf pid=4616 runtime=io.containerd.runc.v2 Feb 12 20:01:18.413000 audit[4605]: NETFILTER_CFG table=nat:128 family=2 entries=30 op=nft_register_rule pid=4605 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:18.413000 audit[4605]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd63474600 a2=0 a3=7ffd634745ec items=0 ppid=2681 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:18.444525 systemd[1]: run-containerd-runc-k8s.io-bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf-runc.wkNclC.mount: Deactivated successfully. Feb 12 20:01:18.453975 systemd[1]: Started cri-containerd-bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf.scope. Feb 12 20:01:18.469463 systemd-networkd[1482]: cali5d40b1b13af: Gained IPv6LL Feb 12 20:01:18.470000 audit[4638]: NETFILTER_CFG table=filter:129 family=2 entries=38 op=nft_register_chain pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:18.470000 audit[4638]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffd4a5225e0 a2=0 a3=7ffd4a5225cc items=0 ppid=4090 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.480000 audit: BPF prog-id=180 op=LOAD Feb 12 20:01:18.481000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.481000 audit[4626]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4616 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263656665343037356333326237366464386338343539633638313265 Feb 12 20:01:18.481000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.481000 audit[4626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4616 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263656665343037356333326237366464386338343539633638313265 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit: BPF prog-id=181 op=LOAD Feb 12 20:01:18.482000 audit[4626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000356a10 items=0 ppid=4616 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263656665343037356333326237366464386338343539633638313265 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.482000 audit: BPF prog-id=182 op=LOAD Feb 12 20:01:18.482000 audit[4626]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000356a58 items=0 ppid=4616 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263656665343037356333326237366464386338343539633638313265 Feb 12 20:01:18.483000 audit: BPF prog-id=182 op=UNLOAD Feb 12 20:01:18.483000 audit: BPF prog-id=181 op=UNLOAD Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { perfmon } for pid=4626 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit[4626]: AVC avc: denied { bpf } for pid=4626 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:18.484000 audit: BPF prog-id=183 op=LOAD Feb 12 20:01:18.484000 audit[4626]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000356e68 items=0 ppid=4616 pid=4626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263656665343037356333326237366464386338343539633638313265 Feb 12 20:01:18.503047 env[1331]: time="2024-02-12T20:01:18.502993806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-f9rqg,Uid:dec3207f-864b-4d9d-b98a-dcf25643ac17,Namespace:calico-system,Attempt:1,} returns sandbox id \"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf\"" Feb 12 20:01:18.521000 audit[4678]: NETFILTER_CFG table=filter:130 family=2 entries=9 op=nft_register_rule pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:18.521000 audit[4678]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd6426ab70 a2=0 a3=7ffd6426ab5c items=0 ppid=2681 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:18.523000 audit[4678]: NETFILTER_CFG table=nat:131 family=2 entries=51 op=nft_register_chain pid=4678 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:18.523000 audit[4678]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffd6426ab70 a2=0 a3=7ffd6426ab5c items=0 ppid=2681 pid=4678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:18.523000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:19.086893 env[1331]: time="2024-02-12T20:01:19.086739352Z" level=info msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" Feb 12 20:01:19.109532 systemd-networkd[1482]: calic4ac1a49ee9: Gained IPv6LL Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.132 [INFO][4694] k8s.go 578: Cleaning up netns ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.134 [INFO][4694] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" iface="eth0" netns="/var/run/netns/cni-65e10791-7ec3-ab67-b716-fc19bdac1703" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.134 [INFO][4694] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" iface="eth0" netns="/var/run/netns/cni-65e10791-7ec3-ab67-b716-fc19bdac1703" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.134 [INFO][4694] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" iface="eth0" netns="/var/run/netns/cni-65e10791-7ec3-ab67-b716-fc19bdac1703" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.134 [INFO][4694] k8s.go 585: Releasing IP address(es) ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.135 [INFO][4694] utils.go 188: Calico CNI releasing IP address ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.152 [INFO][4700] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.152 [INFO][4700] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.152 [INFO][4700] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.159 [WARNING][4700] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.159 [INFO][4700] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.160 [INFO][4700] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:19.162622 env[1331]: 2024-02-12 20:01:19.161 [INFO][4694] k8s.go 591: Teardown processing complete. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:01:19.166997 env[1331]: time="2024-02-12T20:01:19.166890021Z" level=info msg="TearDown network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" successfully" Feb 12 20:01:19.166997 env[1331]: time="2024-02-12T20:01:19.166934522Z" level=info msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" returns successfully" Feb 12 20:01:19.165811 systemd[1]: run-netns-cni\x2d65e10791\x2d7ec3\x2dab67\x2db716\x2dfc19bdac1703.mount: Deactivated successfully. Feb 12 20:01:19.167729 env[1331]: time="2024-02-12T20:01:19.167693426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-cc8zf,Uid:9acb1d2e-4b03-497d-9069-661e8dd819f2,Namespace:kube-system,Attempt:1,}" Feb 12 20:01:19.324284 systemd-networkd[1482]: calia0aeb7cb596: Link UP Feb 12 20:01:19.335964 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:01:19.336067 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0aeb7cb596: link becomes ready Feb 12 20:01:19.336514 systemd-networkd[1482]: calia0aeb7cb596: Gained carrier Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.239 [INFO][4706] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0 coredns-787d4945fb- kube-system 9acb1d2e-4b03-497d-9069-661e8dd819f2 883 0 2024-02-12 20:00:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 coredns-787d4945fb-cc8zf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia0aeb7cb596 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.240 [INFO][4706] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.274 [INFO][4717] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" HandleID="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.283 [INFO][4717] ipam_plugin.go 268: Auto assigning IP ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" HandleID="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002914d0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-996941d352", "pod":"coredns-787d4945fb-cc8zf", "timestamp":"2024-02-12 20:01:19.27416605 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.283 [INFO][4717] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.283 [INFO][4717] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.283 [INFO][4717] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.285 [INFO][4717] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.290 [INFO][4717] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.295 [INFO][4717] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.298 [INFO][4717] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.300 [INFO][4717] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.300 [INFO][4717] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.302 [INFO][4717] ipam.go 1682: Creating new handle: k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.305 [INFO][4717] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.311 [INFO][4717] ipam.go 1216: Successfully claimed IPs: [192.168.61.196/26] block=192.168.61.192/26 handle="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.311 [INFO][4717] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.196/26] handle="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.311 [INFO][4717] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:19.348463 env[1331]: 2024-02-12 20:01:19.311 [INFO][4717] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.196/26] IPv6=[] ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" HandleID="k8s-pod-network.08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.312 [INFO][4706] k8s.go 385: Populated endpoint ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9acb1d2e-4b03-497d-9069-661e8dd819f2", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"coredns-787d4945fb-cc8zf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0aeb7cb596", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.313 [INFO][4706] k8s.go 386: Calico CNI using IPs: [192.168.61.196/32] ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.313 [INFO][4706] dataplane_linux.go 68: Setting the host side veth name to calia0aeb7cb596 ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.336 [INFO][4706] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.337 [INFO][4706] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9acb1d2e-4b03-497d-9069-661e8dd819f2", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e", Pod:"coredns-787d4945fb-cc8zf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0aeb7cb596", MAC:"92:fe:9d:41:79:1a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:19.349573 env[1331]: 2024-02-12 20:01:19.346 [INFO][4706] k8s.go 491: Wrote updated endpoint to datastore ContainerID="08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e" Namespace="kube-system" Pod="coredns-787d4945fb-cc8zf" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:01:19.371090 env[1331]: time="2024-02-12T20:01:19.370890416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:19.371090 env[1331]: time="2024-02-12T20:01:19.370928717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:19.371090 env[1331]: time="2024-02-12T20:01:19.370940917Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:19.371424 env[1331]: time="2024-02-12T20:01:19.371124318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e pid=4743 runtime=io.containerd.runc.v2 Feb 12 20:01:19.390756 systemd[1]: Started cri-containerd-08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e.scope. Feb 12 20:01:19.398000 audit[4762]: NETFILTER_CFG table=filter:132 family=2 entries=38 op=nft_register_chain pid=4762 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:19.398000 audit[4762]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffdca642b30 a2=0 a3=7ffdca642b1c items=0 ppid=4090 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.398000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.414000 audit: BPF prog-id=184 op=LOAD Feb 12 20:01:19.415000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.415000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4743 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393630663964626638383235366431376565633736343831643139 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4743 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393630663964626638383235366431376565633736343831643139 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.416000 audit: BPF prog-id=185 op=LOAD Feb 12 20:01:19.416000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cbf0 items=0 ppid=4743 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393630663964626638383235366431376565633736343831643139 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit: BPF prog-id=186 op=LOAD Feb 12 20:01:19.417000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032cc38 items=0 ppid=4743 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393630663964626638383235366431376565633736343831643139 Feb 12 20:01:19.417000 audit: BPF prog-id=186 op=UNLOAD Feb 12 20:01:19.417000 audit: BPF prog-id=185 op=UNLOAD Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { perfmon } for pid=4753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit[4753]: AVC avc: denied { bpf } for pid=4753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.417000 audit: BPF prog-id=187 op=LOAD Feb 12 20:01:19.417000 audit[4753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032d048 items=0 ppid=4743 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393630663964626638383235366431376565633736343831643139 Feb 12 20:01:19.449972 env[1331]: time="2024-02-12T20:01:19.449921579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-cc8zf,Uid:9acb1d2e-4b03-497d-9069-661e8dd819f2,Namespace:kube-system,Attempt:1,} returns sandbox id \"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e\"" Feb 12 20:01:19.454042 env[1331]: time="2024-02-12T20:01:19.453999703Z" level=info msg="CreateContainer within sandbox \"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:01:19.508962 env[1331]: time="2024-02-12T20:01:19.508911825Z" level=info msg="CreateContainer within sandbox \"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a19cd3ed9d7c5b46b5b82d0dc840824fd72a05fb521ef3cc8f990ef6a39f7fbd\"" Feb 12 20:01:19.509625 env[1331]: time="2024-02-12T20:01:19.509593529Z" level=info msg="StartContainer for \"a19cd3ed9d7c5b46b5b82d0dc840824fd72a05fb521ef3cc8f990ef6a39f7fbd\"" Feb 12 20:01:19.527823 systemd[1]: Started cri-containerd-a19cd3ed9d7c5b46b5b82d0dc840824fd72a05fb521ef3cc8f990ef6a39f7fbd.scope. Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.547000 audit: BPF prog-id=188 op=LOAD Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4743 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131396364336564396437633562343662356238326430646338343038 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4743 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131396364336564396437633562343662356238326430646338343038 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit: BPF prog-id=189 op=LOAD Feb 12 20:01:19.548000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024e70 items=0 ppid=4743 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131396364336564396437633562343662356238326430646338343038 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit: BPF prog-id=190 op=LOAD Feb 12 20:01:19.548000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024eb8 items=0 ppid=4743 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131396364336564396437633562343662356238326430646338343038 Feb 12 20:01:19.548000 audit: BPF prog-id=190 op=UNLOAD Feb 12 20:01:19.548000 audit: BPF prog-id=189 op=UNLOAD Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:19.548000 audit: BPF prog-id=191 op=LOAD Feb 12 20:01:19.548000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000252c8 items=0 ppid=4743 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:19.548000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131396364336564396437633562343662356238326430646338343038 Feb 12 20:01:19.572898 env[1331]: time="2024-02-12T20:01:19.572807799Z" level=info msg="StartContainer for \"a19cd3ed9d7c5b46b5b82d0dc840824fd72a05fb521ef3cc8f990ef6a39f7fbd\" returns successfully" Feb 12 20:01:20.315769 kubelet[2485]: I0212 20:01:20.315733 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-cc8zf" podStartSLOduration=66.315689735 pod.CreationTimestamp="2024-02-12 20:00:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:20.30453707 +0000 UTC m=+78.456172847" watchObservedRunningTime="2024-02-12 20:01:20.315689735 +0000 UTC m=+78.467325612" Feb 12 20:01:20.383000 audit[4874]: NETFILTER_CFG table=filter:133 family=2 entries=6 op=nft_register_rule pid=4874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:20.383000 audit[4874]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe58a36b40 a2=0 a3=7ffe58a36b2c items=0 ppid=2681 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:20.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:20.389378 systemd-networkd[1482]: cali17201d2afaf: Gained IPv6LL Feb 12 20:01:20.389000 audit[4874]: NETFILTER_CFG table=nat:134 family=2 entries=60 op=nft_register_rule pid=4874 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:20.389000 audit[4874]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffe58a36b40 a2=0 a3=7ffe58a36b2c items=0 ppid=2681 pid=4874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:20.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:20.432000 audit[4900]: NETFILTER_CFG table=filter:135 family=2 entries=6 op=nft_register_rule pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:20.432000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe19f9feb0 a2=0 a3=7ffe19f9fe9c items=0 ppid=2681 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:20.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:20.464000 audit[4900]: NETFILTER_CFG table=nat:136 family=2 entries=72 op=nft_register_chain pid=4900 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:20.464000 audit[4900]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe19f9feb0 a2=0 a3=7ffe19f9fe9c items=0 ppid=2681 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:20.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:20.709440 systemd-networkd[1482]: calia0aeb7cb596: Gained IPv6LL Feb 12 20:01:22.959082 env[1331]: time="2024-02-12T20:01:22.958973645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:22.981526 env[1331]: time="2024-02-12T20:01:22.981474874Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:22.994430 env[1331]: time="2024-02-12T20:01:22.994384448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:23.010895 env[1331]: time="2024-02-12T20:01:23.010844841Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:23.012075 env[1331]: time="2024-02-12T20:01:23.012034648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 20:01:23.013854 env[1331]: time="2024-02-12T20:01:23.013824458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:01:23.034454 env[1331]: time="2024-02-12T20:01:23.034415275Z" level=info msg="CreateContainer within sandbox \"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:01:23.088974 env[1331]: time="2024-02-12T20:01:23.088918384Z" level=info msg="CreateContainer within sandbox \"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0\"" Feb 12 20:01:23.089533 env[1331]: time="2024-02-12T20:01:23.089497987Z" level=info msg="StartContainer for \"9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0\"" Feb 12 20:01:23.114291 systemd[1]: Started cri-containerd-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0.scope. Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.140442 kernel: kauditd_printk_skb: 440 callbacks suppressed Feb 12 20:01:23.140560 kernel: audit: type=1400 audit(1707768083.129:1392): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.162665 kernel: audit: type=1400 audit(1707768083.129:1393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.176302 kernel: audit: type=1400 audit(1707768083.129:1394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.190209 kernel: audit: type=1400 audit(1707768083.129:1395): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.219443 kernel: audit: type=1400 audit(1707768083.129:1396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.219606 kernel: audit: type=1400 audit(1707768083.129:1397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.236257 kernel: audit: type=1400 audit(1707768083.129:1398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.239848 env[1331]: time="2024-02-12T20:01:23.239810738Z" level=info msg="StartContainer for \"9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0\" returns successfully" Feb 12 20:01:23.252314 kernel: audit: type=1400 audit(1707768083.129:1399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.268333 kernel: audit: type=1400 audit(1707768083.129:1400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.282274 kernel: audit: type=1400 audit(1707768083.129:1401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.129000 audit: BPF prog-id=192 op=LOAD Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4397 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:23.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393164363232353833363436616632646465343835356337376634 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4397 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:23.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393164363232353833363436616632646465343835356337376634 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.139000 audit: BPF prog-id=193 op=LOAD Feb 12 20:01:23.139000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e9d10 items=0 ppid=4397 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:23.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393164363232353833363436616632646465343835356337376634 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit: BPF prog-id=194 op=LOAD Feb 12 20:01:23.161000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000e9d58 items=0 ppid=4397 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393164363232353833363436616632646465343835356337376634 Feb 12 20:01:23.161000 audit: BPF prog-id=194 op=UNLOAD Feb 12 20:01:23.161000 audit: BPF prog-id=193 op=UNLOAD Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { perfmon } for pid=4914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit[4914]: AVC avc: denied { bpf } for pid=4914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:23.161000 audit: BPF prog-id=195 op=LOAD Feb 12 20:01:23.161000 audit[4914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f0168 items=0 ppid=4397 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:23.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962393164363232353833363436616632646465343835356337376634 Feb 12 20:01:23.327074 kubelet[2485]: I0212 20:01:23.326183 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-57ff975f4d-4l2gq" podStartSLOduration=-9.223371974528643e+09 pod.CreationTimestamp="2024-02-12 20:00:21 +0000 UTC" firstStartedPulling="2024-02-12 20:01:17.709031398 +0000 UTC m=+75.860667175" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:23.325592624 +0000 UTC m=+81.477228401" watchObservedRunningTime="2024-02-12 20:01:23.326132827 +0000 UTC m=+81.477768604" Feb 12 20:01:25.413282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2576560500.mount: Deactivated successfully. Feb 12 20:01:25.761691 kubelet[2485]: I0212 20:01:25.761577 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:01:25.768324 systemd[1]: Created slice kubepods-besteffort-podc74e2f19_1baa_4f6d_82f7_bf8045278091.slice. Feb 12 20:01:25.772288 kubelet[2485]: I0212 20:01:25.772265 2485 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:01:25.777453 systemd[1]: Created slice kubepods-besteffort-podbdad7e62_3e69_421c_96a5_6ce2cd5878d7.slice. Feb 12 20:01:25.851000 audit[4994]: NETFILTER_CFG table=filter:137 family=2 entries=7 op=nft_register_rule pid=4994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:25.851000 audit[4994]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe2b87cca0 a2=0 a3=7ffe2b87cc8c items=0 ppid=2681 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:25.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:25.854000 audit[4994]: NETFILTER_CFG table=nat:138 family=2 entries=78 op=nft_register_rule pid=4994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:25.854000 audit[4994]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe2b87cca0 a2=0 a3=7ffe2b87cc8c items=0 ppid=2681 pid=4994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:25.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:25.905059 kubelet[2485]: I0212 20:01:25.905025 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xjtk6\" (UniqueName: \"kubernetes.io/projected/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-kube-api-access-xjtk6\") pod \"calico-apiserver-6b459cd5b4-b5bt8\" (UID: \"bdad7e62-3e69-421c-96a5-6ce2cd5878d7\") " pod="calico-apiserver/calico-apiserver-6b459cd5b4-b5bt8" Feb 12 20:01:25.905266 kubelet[2485]: I0212 20:01:25.905100 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c74e2f19-1baa-4f6d-82f7-bf8045278091-calico-apiserver-certs\") pod \"calico-apiserver-6b459cd5b4-59s5c\" (UID: \"c74e2f19-1baa-4f6d-82f7-bf8045278091\") " pod="calico-apiserver/calico-apiserver-6b459cd5b4-59s5c" Feb 12 20:01:25.905266 kubelet[2485]: I0212 20:01:25.905130 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gdst5\" (UniqueName: \"kubernetes.io/projected/c74e2f19-1baa-4f6d-82f7-bf8045278091-kube-api-access-gdst5\") pod \"calico-apiserver-6b459cd5b4-59s5c\" (UID: \"c74e2f19-1baa-4f6d-82f7-bf8045278091\") " pod="calico-apiserver/calico-apiserver-6b459cd5b4-59s5c" Feb 12 20:01:25.905266 kubelet[2485]: I0212 20:01:25.905175 2485 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-calico-apiserver-certs\") pod \"calico-apiserver-6b459cd5b4-b5bt8\" (UID: \"bdad7e62-3e69-421c-96a5-6ce2cd5878d7\") " pod="calico-apiserver/calico-apiserver-6b459cd5b4-b5bt8" Feb 12 20:01:25.904000 audit[5020]: NETFILTER_CFG table=filter:139 family=2 entries=8 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:25.904000 audit[5020]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcd519c860 a2=0 a3=7ffcd519c84c items=0 ppid=2681 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:25.904000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:25.907000 audit[5020]: NETFILTER_CFG table=nat:140 family=2 entries=78 op=nft_register_rule pid=5020 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:25.907000 audit[5020]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcd519c860 a2=0 a3=7ffcd519c84c items=0 ppid=2681 pid=5020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:25.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:26.006664 kubelet[2485]: E0212 20:01:26.006634 2485 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:01:26.006909 kubelet[2485]: E0212 20:01:26.006898 2485 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-calico-apiserver-certs podName:bdad7e62-3e69-421c-96a5-6ce2cd5878d7 nodeName:}" failed. No retries permitted until 2024-02-12 20:01:26.506878683 +0000 UTC m=+84.658514460 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-calico-apiserver-certs") pod "calico-apiserver-6b459cd5b4-b5bt8" (UID: "bdad7e62-3e69-421c-96a5-6ce2cd5878d7") : secret "calico-apiserver-certs" not found Feb 12 20:01:26.007258 kubelet[2485]: E0212 20:01:26.006442 2485 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:01:26.007436 kubelet[2485]: E0212 20:01:26.007422 2485 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c74e2f19-1baa-4f6d-82f7-bf8045278091-calico-apiserver-certs podName:c74e2f19-1baa-4f6d-82f7-bf8045278091 nodeName:}" failed. No retries permitted until 2024-02-12 20:01:26.507404086 +0000 UTC m=+84.659039963 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c74e2f19-1baa-4f6d-82f7-bf8045278091-calico-apiserver-certs") pod "calico-apiserver-6b459cd5b4-59s5c" (UID: "c74e2f19-1baa-4f6d-82f7-bf8045278091") : secret "calico-apiserver-certs" not found Feb 12 20:01:26.508986 kubelet[2485]: E0212 20:01:26.508945 2485 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:01:26.509182 kubelet[2485]: E0212 20:01:26.509026 2485 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-calico-apiserver-certs podName:bdad7e62-3e69-421c-96a5-6ce2cd5878d7 nodeName:}" failed. No retries permitted until 2024-02-12 20:01:27.509006163 +0000 UTC m=+85.660641940 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/bdad7e62-3e69-421c-96a5-6ce2cd5878d7-calico-apiserver-certs") pod "calico-apiserver-6b459cd5b4-b5bt8" (UID: "bdad7e62-3e69-421c-96a5-6ce2cd5878d7") : secret "calico-apiserver-certs" not found Feb 12 20:01:26.509182 kubelet[2485]: E0212 20:01:26.508945 2485 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:01:26.509182 kubelet[2485]: E0212 20:01:26.509066 2485 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/c74e2f19-1baa-4f6d-82f7-bf8045278091-calico-apiserver-certs podName:c74e2f19-1baa-4f6d-82f7-bf8045278091 nodeName:}" failed. No retries permitted until 2024-02-12 20:01:27.509057664 +0000 UTC m=+85.660693441 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/c74e2f19-1baa-4f6d-82f7-bf8045278091-calico-apiserver-certs") pod "calico-apiserver-6b459cd5b4-59s5c" (UID: "c74e2f19-1baa-4f6d-82f7-bf8045278091") : secret "calico-apiserver-certs" not found Feb 12 20:01:26.510938 env[1331]: time="2024-02-12T20:01:26.510897974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:26.525341 env[1331]: time="2024-02-12T20:01:26.525300654Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:26.532532 env[1331]: time="2024-02-12T20:01:26.532499993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:26.538525 env[1331]: time="2024-02-12T20:01:26.538487827Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:26.539072 env[1331]: time="2024-02-12T20:01:26.539036730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:01:26.541153 env[1331]: time="2024-02-12T20:01:26.541121641Z" level=info msg="CreateContainer within sandbox \"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:01:26.592177 env[1331]: time="2024-02-12T20:01:26.592118824Z" level=info msg="CreateContainer within sandbox \"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a56a23a31df0e19c408115499231f47e980298c521006c3d184671375fcca46e\"" Feb 12 20:01:26.592755 env[1331]: time="2024-02-12T20:01:26.592716527Z" level=info msg="StartContainer for \"a56a23a31df0e19c408115499231f47e980298c521006c3d184671375fcca46e\"" Feb 12 20:01:26.626137 systemd[1]: run-containerd-runc-k8s.io-a56a23a31df0e19c408115499231f47e980298c521006c3d184671375fcca46e-runc.iwr7o0.mount: Deactivated successfully. Feb 12 20:01:26.630729 systemd[1]: Started cri-containerd-a56a23a31df0e19c408115499231f47e980298c521006c3d184671375fcca46e.scope. Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7ff248ee0498 items=0 ppid=4616 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:26.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135366132336133316466306531396334303831313534393932333166 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit: BPF prog-id=196 op=LOAD Feb 12 20:01:26.644000 audit[5031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00038c828 items=0 ppid=4616 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:26.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135366132336133316466306531396334303831313534393932333166 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit: BPF prog-id=197 op=LOAD Feb 12 20:01:26.644000 audit[5031]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00038c878 items=0 ppid=4616 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:26.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135366132336133316466306531396334303831313534393932333166 Feb 12 20:01:26.644000 audit: BPF prog-id=197 op=UNLOAD Feb 12 20:01:26.644000 audit: BPF prog-id=196 op=UNLOAD Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { perfmon } for pid=5031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit[5031]: AVC avc: denied { bpf } for pid=5031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:26.644000 audit: BPF prog-id=198 op=LOAD Feb 12 20:01:26.644000 audit[5031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00038c908 items=0 ppid=4616 pid=5031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:26.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135366132336133316466306531396334303831313534393932333166 Feb 12 20:01:26.668698 env[1331]: time="2024-02-12T20:01:26.668648947Z" level=info msg="StartContainer for \"a56a23a31df0e19c408115499231f47e980298c521006c3d184671375fcca46e\" returns successfully" Feb 12 20:01:26.669864 env[1331]: time="2024-02-12T20:01:26.669833554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:01:27.573180 env[1331]: time="2024-02-12T20:01:27.571898825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b459cd5b4-59s5c,Uid:c74e2f19-1baa-4f6d-82f7-bf8045278091,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:01:27.581126 env[1331]: time="2024-02-12T20:01:27.581086276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b459cd5b4-b5bt8,Uid:bdad7e62-3e69-421c-96a5-6ce2cd5878d7,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:01:27.790191 systemd-networkd[1482]: calid8dc78a578c: Link UP Feb 12 20:01:27.794626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:01:27.794719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8dc78a578c: link becomes ready Feb 12 20:01:27.800732 systemd-networkd[1482]: calid8dc78a578c: Gained carrier Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.684 [INFO][5062] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0 calico-apiserver-6b459cd5b4- calico-apiserver c74e2f19-1baa-4f6d-82f7-bf8045278091 964 0 2024-02-12 20:01:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b459cd5b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 calico-apiserver-6b459cd5b4-59s5c eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid8dc78a578c [] []}} ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.684 [INFO][5062] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.739 [INFO][5086] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" HandleID="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.756 [INFO][5086] ipam_plugin.go 268: Auto assigning IP ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" HandleID="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bfa10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-996941d352", "pod":"calico-apiserver-6b459cd5b4-59s5c", "timestamp":"2024-02-12 20:01:27.739086544 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.756 [INFO][5086] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.756 [INFO][5086] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.756 [INFO][5086] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.758 [INFO][5086] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.761 [INFO][5086] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.764 [INFO][5086] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.766 [INFO][5086] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.768 [INFO][5086] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.768 [INFO][5086] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.771 [INFO][5086] ipam.go 1682: Creating new handle: k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.776 [INFO][5086] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.784 [INFO][5086] ipam.go 1216: Successfully claimed IPs: [192.168.61.197/26] block=192.168.61.192/26 handle="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.784 [INFO][5086] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.197/26] handle="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.784 [INFO][5086] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:27.841403 env[1331]: 2024-02-12 20:01:27.784 [INFO][5086] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.197/26] IPv6=[] ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" HandleID="k8s-pod-network.d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.786 [INFO][5062] k8s.go 385: Populated endpoint ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0", GenerateName:"calico-apiserver-6b459cd5b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c74e2f19-1baa-4f6d-82f7-bf8045278091", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 1, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b459cd5b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"calico-apiserver-6b459cd5b4-59s5c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8dc78a578c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.786 [INFO][5062] k8s.go 386: Calico CNI using IPs: [192.168.61.197/32] ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.786 [INFO][5062] dataplane_linux.go 68: Setting the host side veth name to calid8dc78a578c ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.802 [INFO][5062] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.809 [INFO][5062] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0", GenerateName:"calico-apiserver-6b459cd5b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"c74e2f19-1baa-4f6d-82f7-bf8045278091", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 1, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b459cd5b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a", Pod:"calico-apiserver-6b459cd5b4-59s5c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid8dc78a578c", MAC:"36:91:84:96:aa:a8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:27.842696 env[1331]: 2024-02-12 20:01:27.834 [INFO][5062] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-59s5c" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--59s5c-eth0" Feb 12 20:01:27.885765 systemd-networkd[1482]: cali967c25d86c0: Link UP Feb 12 20:01:27.892617 systemd-networkd[1482]: cali967c25d86c0: Gained carrier Feb 12 20:01:27.893295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali967c25d86c0: link becomes ready Feb 12 20:01:27.904034 env[1331]: time="2024-02-12T20:01:27.903968050Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:27.904248 env[1331]: time="2024-02-12T20:01:27.904198552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:27.904397 env[1331]: time="2024-02-12T20:01:27.904369853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:27.904714 env[1331]: time="2024-02-12T20:01:27.904663054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a pid=5129 runtime=io.containerd.runc.v2 Feb 12 20:01:27.916000 audit[5137]: NETFILTER_CFG table=filter:141 family=2 entries=59 op=nft_register_chain pid=5137 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:27.916000 audit[5137]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffe9e4ed1a0 a2=0 a3=7ffe9e4ed18c items=0 ppid=4090 pid=5137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:27.916000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.715 [INFO][5074] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0 calico-apiserver-6b459cd5b4- calico-apiserver bdad7e62-3e69-421c-96a5-6ce2cd5878d7 968 0 2024-02-12 20:01:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6b459cd5b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-996941d352 calico-apiserver-6b459cd5b4-b5bt8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali967c25d86c0 [] []}} ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.715 [INFO][5074] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.782 [INFO][5092] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" HandleID="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.812 [INFO][5092] ipam_plugin.go 268: Auto assigning IP ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" HandleID="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000501b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-996941d352", "pod":"calico-apiserver-6b459cd5b4-b5bt8", "timestamp":"2024-02-12 20:01:27.782612083 +0000 UTC"}, Hostname:"ci-3510.3.2-a-996941d352", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.812 [INFO][5092] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.812 [INFO][5092] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.812 [INFO][5092] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-996941d352' Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.816 [INFO][5092] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.832 [INFO][5092] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.846 [INFO][5092] ipam.go 489: Trying affinity for 192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.847 [INFO][5092] ipam.go 155: Attempting to load block cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.851 [INFO][5092] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.192/26 host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.851 [INFO][5092] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.192/26 handle="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.857 [INFO][5092] ipam.go 1682: Creating new handle: k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2 Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.861 [INFO][5092] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.192/26 handle="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.870 [INFO][5092] ipam.go 1216: Successfully claimed IPs: [192.168.61.198/26] block=192.168.61.192/26 handle="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.870 [INFO][5092] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.198/26] handle="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" host="ci-3510.3.2-a-996941d352" Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.870 [INFO][5092] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:01:27.925509 env[1331]: 2024-02-12 20:01:27.870 [INFO][5092] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.198/26] IPv6=[] ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" HandleID="k8s-pod-network.808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Workload="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.872 [INFO][5074] k8s.go 385: Populated endpoint ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0", GenerateName:"calico-apiserver-6b459cd5b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdad7e62-3e69-421c-96a5-6ce2cd5878d7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 1, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b459cd5b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"", Pod:"calico-apiserver-6b459cd5b4-b5bt8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali967c25d86c0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.872 [INFO][5074] k8s.go 386: Calico CNI using IPs: [192.168.61.198/32] ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.872 [INFO][5074] dataplane_linux.go 68: Setting the host side veth name to cali967c25d86c0 ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.893 [INFO][5074] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.895 [INFO][5074] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0", GenerateName:"calico-apiserver-6b459cd5b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"bdad7e62-3e69-421c-96a5-6ce2cd5878d7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 1, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6b459cd5b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2", Pod:"calico-apiserver-6b459cd5b4-b5bt8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali967c25d86c0", MAC:"9e:0a:5e:b6:84:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:01:27.926420 env[1331]: 2024-02-12 20:01:27.923 [INFO][5074] k8s.go 491: Wrote updated endpoint to datastore ContainerID="808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2" Namespace="calico-apiserver" Pod="calico-apiserver-6b459cd5b4-b5bt8" WorkloadEndpoint="ci--3510.3.2--a--996941d352-k8s-calico--apiserver--6b459cd5b4--b5bt8-eth0" Feb 12 20:01:27.935957 systemd[1]: Started cri-containerd-d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a.scope. Feb 12 20:01:27.958569 env[1331]: time="2024-02-12T20:01:27.958503150Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:01:27.958714 env[1331]: time="2024-02-12T20:01:27.958588951Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:01:27.958714 env[1331]: time="2024-02-12T20:01:27.958617151Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:01:27.958942 env[1331]: time="2024-02-12T20:01:27.958887552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2 pid=5169 runtime=io.containerd.runc.v2 Feb 12 20:01:27.980665 systemd[1]: Started cri-containerd-808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2.scope. Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.994000 audit: BPF prog-id=199 op=LOAD Feb 12 20:01:27.995000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.995000 audit[5139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5129 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:27.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366536303066666434363331383130336165313231373463353034 Feb 12 20:01:27.995000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.995000 audit[5139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=5129 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:27.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366536303066666434363331383130336165313231373463353034 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.996000 audit: BPF prog-id=200 op=LOAD Feb 12 20:01:27.996000 audit[5139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002871f0 items=0 ppid=5129 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:27.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366536303066666434363331383130336165313231373463353034 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:27.999000 audit: BPF prog-id=201 op=LOAD Feb 12 20:01:27.999000 audit[5139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000287238 items=0 ppid=5129 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:27.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366536303066666434363331383130336165313231373463353034 Feb 12 20:01:28.000000 audit: BPF prog-id=201 op=UNLOAD Feb 12 20:01:28.000000 audit: BPF prog-id=200 op=UNLOAD Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { perfmon } for pid=5139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit[5139]: AVC avc: denied { bpf } for pid=5139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.000000 audit: BPF prog-id=202 op=LOAD Feb 12 20:01:28.000000 audit[5139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000287648 items=0 ppid=5129 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit: BPF prog-id=203 op=LOAD Feb 12 20:01:28.002000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5169 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386362643538376531323265343065353532393734646639386336 Feb 12 20:01:28.002000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.002000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5169 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386362643538376531323265343065353532393734646639386336 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit: BPF prog-id=204 op=LOAD Feb 12 20:01:28.003000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000096350 items=0 ppid=5169 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386362643538376531323265343065353532393734646639386336 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit: BPF prog-id=205 op=LOAD Feb 12 20:01:28.003000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000096398 items=0 ppid=5169 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386362643538376531323265343065353532393734646639386336 Feb 12 20:01:28.003000 audit: BPF prog-id=205 op=UNLOAD Feb 12 20:01:28.003000 audit: BPF prog-id=204 op=UNLOAD Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { perfmon } for pid=5180 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit[5180]: AVC avc: denied { bpf } for pid=5180 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:28.003000 audit: BPF prog-id=206 op=LOAD Feb 12 20:01:28.003000 audit[5180]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000967a8 items=0 ppid=5169 pid=5180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830386362643538376531323265343065353532393734646639386336 Feb 12 20:01:28.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439366536303066666434363331383130336165313231373463353034 Feb 12 20:01:28.030000 audit[5196]: NETFILTER_CFG table=filter:142 family=2 entries=50 op=nft_register_chain pid=5196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:01:28.030000 audit[5196]: SYSCALL arch=c000003e syscall=46 success=yes exit=24496 a0=3 a1=7ffd45aa0770 a2=0 a3=7ffd45aa075c items=0 ppid=4090 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:28.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:01:28.060753 env[1331]: time="2024-02-12T20:01:28.060718710Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b459cd5b4-b5bt8,Uid:bdad7e62-3e69-421c-96a5-6ce2cd5878d7,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2\"" Feb 12 20:01:28.081653 env[1331]: time="2024-02-12T20:01:28.081615124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6b459cd5b4-59s5c,Uid:c74e2f19-1baa-4f6d-82f7-bf8045278091,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a\"" Feb 12 20:01:29.304091 env[1331]: time="2024-02-12T20:01:29.304024083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:29.308763 env[1331]: time="2024-02-12T20:01:29.308717609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:29.314968 env[1331]: time="2024-02-12T20:01:29.314931942Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:29.318184 env[1331]: time="2024-02-12T20:01:29.318149160Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:29.318680 env[1331]: time="2024-02-12T20:01:29.318479762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:01:29.320092 env[1331]: time="2024-02-12T20:01:29.319687368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:01:29.320330 env[1331]: time="2024-02-12T20:01:29.320297371Z" level=info msg="CreateContainer within sandbox \"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:01:29.360040 env[1331]: time="2024-02-12T20:01:29.359997187Z" level=info msg="CreateContainer within sandbox \"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3a0d2c6f0b54c9caa0216995c2a17e5ccea704d40eb2922fd8e4bbb1ff8916d1\"" Feb 12 20:01:29.360595 env[1331]: time="2024-02-12T20:01:29.360559390Z" level=info msg="StartContainer for \"3a0d2c6f0b54c9caa0216995c2a17e5ccea704d40eb2922fd8e4bbb1ff8916d1\"" Feb 12 20:01:29.390479 systemd[1]: Started cri-containerd-3a0d2c6f0b54c9caa0216995c2a17e5ccea704d40eb2922fd8e4bbb1ff8916d1.scope. Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.412589 kernel: kauditd_printk_skb: 222 callbacks suppressed Feb 12 20:01:29.412670 kernel: audit: type=1400 audit(1707768089.406:1458): avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426739 systemd-networkd[1482]: calid8dc78a578c: Gained IPv6LL Feb 12 20:01:29.406000 audit[5222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f9a6dbd9848 items=0 ppid=4616 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:29.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361306432633666306235346339636161303231363939356332613137 Feb 12 20:01:29.474056 kernel: audit: type=1300 audit(1707768089.406:1458): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f9a6dbd9848 items=0 ppid=4616 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:29.474197 kernel: audit: type=1327 audit(1707768089.406:1458): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361306432633666306235346339636161303231363939356332613137 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.501684 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.501815 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.502313 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.516241 env[1331]: time="2024-02-12T20:01:29.516139833Z" level=info msg="StartContainer for \"3a0d2c6f0b54c9caa0216995c2a17e5ccea704d40eb2922fd8e4bbb1ff8916d1\" returns successfully" Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.541642 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.541789 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.541824 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.567054 kernel: audit: type=1400 audit(1707768089.406:1459): avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.406000 audit: BPF prog-id=207 op=LOAD Feb 12 20:01:29.406000 audit[5222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003ce1c8 items=0 ppid=4616 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:29.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361306432633666306235346339636161303231363939356332613137 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit: BPF prog-id=208 op=LOAD Feb 12 20:01:29.426000 audit[5222]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003ce218 items=0 ppid=4616 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:29.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361306432633666306235346339636161303231363939356332613137 Feb 12 20:01:29.426000 audit: BPF prog-id=208 op=UNLOAD Feb 12 20:01:29.426000 audit: BPF prog-id=207 op=UNLOAD Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { perfmon } for pid=5222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit[5222]: AVC avc: denied { bpf } for pid=5222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:29.426000 audit: BPF prog-id=209 op=LOAD Feb 12 20:01:29.426000 audit[5222]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003ce2a8 items=0 ppid=4616 pid=5222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:29.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361306432633666306235346339636161303231363939356332613137 Feb 12 20:01:29.733571 systemd-networkd[1482]: cali967c25d86c0: Gained IPv6LL Feb 12 20:01:30.227301 kubelet[2485]: I0212 20:01:30.226875 2485 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:01:30.227301 kubelet[2485]: I0212 20:01:30.226928 2485 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:01:34.357962 env[1331]: time="2024-02-12T20:01:34.357910556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:34.363708 env[1331]: time="2024-02-12T20:01:34.363661686Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:34.367048 env[1331]: time="2024-02-12T20:01:34.367011703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:34.371526 env[1331]: time="2024-02-12T20:01:34.371490927Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:34.372178 env[1331]: time="2024-02-12T20:01:34.372146530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:01:34.374829 env[1331]: time="2024-02-12T20:01:34.373827039Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:01:34.376541 env[1331]: time="2024-02-12T20:01:34.376509253Z" level=info msg="CreateContainer within sandbox \"808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:01:34.402469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3442841321.mount: Deactivated successfully. Feb 12 20:01:34.415349 env[1331]: time="2024-02-12T20:01:34.415299957Z" level=info msg="CreateContainer within sandbox \"808cbd587e122e40e552974df98c66b8c32991e064776e7c111e2ffbf2c909b2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d\"" Feb 12 20:01:34.417614 env[1331]: time="2024-02-12T20:01:34.416058261Z" level=info msg="StartContainer for \"d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d\"" Feb 12 20:01:34.448517 systemd[1]: Started cri-containerd-d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d.scope. Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.469434 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 12 20:01:34.469470 kernel: audit: type=1400 audit(1707768094.463:1464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.496838 kernel: audit: type=1400 audit(1707768094.463:1465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.496943 kernel: audit: type=1400 audit(1707768094.463:1466): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.524806 kernel: audit: type=1400 audit(1707768094.463:1467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.564523 kernel: audit: type=1400 audit(1707768094.463:1468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.564670 kernel: audit: type=1400 audit(1707768094.463:1469): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.564711 kernel: audit: type=1400 audit(1707768094.463:1470): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.564746 kernel: audit: type=1400 audit(1707768094.463:1471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.591681 kernel: audit: type=1400 audit(1707768094.463:1472): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.606891 kernel: audit: type=1400 audit(1707768094.496:1473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.496000 audit: BPF prog-id=210 op=LOAD Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5169 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:34.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436396437643933376161663362323765613765663532613438623462 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=5169 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:34.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436396437643933376161663362323765613765663532613438623462 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.497000 audit: BPF prog-id=211 op=LOAD Feb 12 20:01:34.497000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001e5db0 items=0 ppid=5169 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:34.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436396437643933376161663362323765613765663532613438623462 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.508000 audit: BPF prog-id=212 op=LOAD Feb 12 20:01:34.508000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001e5df8 items=0 ppid=5169 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:34.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436396437643933376161663362323765613765663532613438623462 Feb 12 20:01:34.522000 audit: BPF prog-id=212 op=UNLOAD Feb 12 20:01:34.522000 audit: BPF prog-id=211 op=UNLOAD Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { perfmon } for pid=5284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit[5284]: AVC avc: denied { bpf } for pid=5284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:34.522000 audit: BPF prog-id=213 op=LOAD Feb 12 20:01:34.522000 audit[5284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ae208 items=0 ppid=5169 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:34.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436396437643933376161663362323765613765663532613438623462 Feb 12 20:01:34.627416 env[1331]: time="2024-02-12T20:01:34.627367869Z" level=info msg="StartContainer for \"d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d\" returns successfully" Feb 12 20:01:34.996000 audit[5297]: AVC avc: denied { watch } for pid=5297 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.3562585575/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c849 tclass=file permissive=0 Feb 12 20:01:34.996000 audit[5297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cfd6c0 a2=fc6 a3=0 items=0 ppid=5169 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 key=(null) Feb 12 20:01:34.996000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:01:35.006753 env[1331]: time="2024-02-12T20:01:35.006711660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:35.013407 env[1331]: time="2024-02-12T20:01:35.013367994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:35.017986 env[1331]: time="2024-02-12T20:01:35.017947718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:35.021190 env[1331]: time="2024-02-12T20:01:35.021156735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:01:35.021741 env[1331]: time="2024-02-12T20:01:35.021710738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:01:35.024310 env[1331]: time="2024-02-12T20:01:35.024276351Z" level=info msg="CreateContainer within sandbox \"d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:01:35.056348 env[1331]: time="2024-02-12T20:01:35.056295218Z" level=info msg="CreateContainer within sandbox \"d96e600ffd46318103ae12174c50424e445c609181ae2673caacabcb89c9954a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f\"" Feb 12 20:01:35.058501 env[1331]: time="2024-02-12T20:01:35.058468930Z" level=info msg="StartContainer for \"0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f\"" Feb 12 20:01:35.076382 systemd[1]: Started cri-containerd-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f.scope. Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.091000 audit: BPF prog-id=214 op=LOAD Feb 12 20:01:35.092000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.092000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=5129 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633738656339623764323439333431326632343861613161323932 Feb 12 20:01:35.092000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.092000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=5129 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633738656339623764323439333431326632343861613161323932 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit: BPF prog-id=215 op=LOAD Feb 12 20:01:35.093000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000257d10 items=0 ppid=5129 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633738656339623764323439333431326632343861613161323932 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.093000 audit: BPF prog-id=216 op=LOAD Feb 12 20:01:35.093000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000257d58 items=0 ppid=5129 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633738656339623764323439333431326632343861613161323932 Feb 12 20:01:35.094000 audit: BPF prog-id=216 op=UNLOAD Feb 12 20:01:35.094000 audit: BPF prog-id=215 op=UNLOAD Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { perfmon } for pid=5331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit[5331]: AVC avc: denied { bpf } for pid=5331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:01:35.094000 audit: BPF prog-id=217 op=LOAD Feb 12 20:01:35.094000 audit[5331]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d2168 items=0 ppid=5129 pid=5331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633738656339623764323439333431326632343861613161323932 Feb 12 20:01:35.129531 env[1331]: time="2024-02-12T20:01:35.129480600Z" level=info msg="StartContainer for \"0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f\" returns successfully" Feb 12 20:01:35.351696 kubelet[2485]: I0212 20:01:35.351667 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b459cd5b4-b5bt8" podStartSLOduration=-9.223372026503164e+09 pod.CreationTimestamp="2024-02-12 20:01:25 +0000 UTC" firstStartedPulling="2024-02-12 20:01:28.063362224 +0000 UTC m=+86.214998101" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:35.349074945 +0000 UTC m=+93.500710822" watchObservedRunningTime="2024-02-12 20:01:35.351611959 +0000 UTC m=+93.503247836" Feb 12 20:01:35.353069 kubelet[2485]: I0212 20:01:35.353044 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-f9rqg" podStartSLOduration=-9.223371961501774e+09 pod.CreationTimestamp="2024-02-12 20:00:20 +0000 UTC" firstStartedPulling="2024-02-12 20:01:18.504356214 +0000 UTC m=+76.655992091" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:30.333680751 +0000 UTC m=+88.485316528" watchObservedRunningTime="2024-02-12 20:01:35.353001066 +0000 UTC m=+93.504636943" Feb 12 20:01:35.429000 audit[5388]: NETFILTER_CFG table=filter:143 family=2 entries=8 op=nft_register_rule pid=5388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:35.429000 audit[5388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff5f817ac0 a2=0 a3=7fff5f817aac items=0 ppid=2681 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.429000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:35.432000 audit[5388]: NETFILTER_CFG table=nat:144 family=2 entries=78 op=nft_register_rule pid=5388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:35.432000 audit[5388]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff5f817ac0 a2=0 a3=7fff5f817aac items=0 ppid=2681 pid=5388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:35.491000 audit[5414]: NETFILTER_CFG table=filter:145 family=2 entries=8 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:35.491000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe5f6608e0 a2=0 a3=7ffe5f6608cc items=0 ppid=2681 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:35.493000 audit[5414]: NETFILTER_CFG table=nat:146 family=2 entries=78 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:35.493000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe5f6608e0 a2=0 a3=7ffe5f6608cc items=0 ppid=2681 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:35.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:35.686000 audit[5345]: AVC avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:01:35.686000 audit[5345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ae7c40 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:01:35.686000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:01:49.561748 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.oKYqTy.mount: Deactivated successfully. Feb 12 20:01:56.815274 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 20:01:56.815457 kernel: audit: type=1400 audit(1707768116.809:1506): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:56.809000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:56.809000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014b76e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:56.854582 kernel: audit: type=1300 audit(1707768116.809:1506): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0014b76e0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:56.854749 kernel: audit: type=1327 audit(1707768116.809:1506): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:56.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:56.809000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:56.889734 kernel: audit: type=1400 audit(1707768116.809:1507): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:56.889870 kernel: audit: type=1300 audit(1707768116.809:1507): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f1b900 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:56.809000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f1b900 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:01:56.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:56.929066 kernel: audit: type=1327 audit(1707768116.809:1507): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:01:57.597578 systemd[1]: run-containerd-runc-k8s.io-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f-runc.fjK3Aq.mount: Deactivated successfully. Feb 12 20:01:57.628507 systemd[1]: run-containerd-runc-k8s.io-d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d-runc.GQSjdW.mount: Deactivated successfully. Feb 12 20:01:57.679467 kubelet[2485]: I0212 20:01:57.679429 2485 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6b459cd5b4-59s5c" podStartSLOduration=-9.223372004175394e+09 pod.CreationTimestamp="2024-02-12 20:01:25 +0000 UTC" firstStartedPulling="2024-02-12 20:01:28.08276083 +0000 UTC m=+86.234396607" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:01:35.372385267 +0000 UTC m=+93.524021044" watchObservedRunningTime="2024-02-12 20:01:57.679381889 +0000 UTC m=+115.831017666" Feb 12 20:01:57.753000 audit[5522]: NETFILTER_CFG table=filter:147 family=2 entries=7 op=nft_register_rule pid=5522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.765253 kernel: audit: type=1325 audit(1707768117.753:1508): table=filter:147 family=2 entries=7 op=nft_register_rule pid=5522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.765344 kernel: audit: type=1300 audit(1707768117.753:1508): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc0bb8d730 a2=0 a3=7ffc0bb8d71c items=0 ppid=2681 pid=5522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:57.753000 audit[5522]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc0bb8d730 a2=0 a3=7ffc0bb8d71c items=0 ppid=2681 pid=5522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:57.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:57.799636 kernel: audit: type=1327 audit(1707768117.753:1508): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:57.753000 audit[5522]: NETFILTER_CFG table=nat:148 family=2 entries=85 op=nft_register_chain pid=5522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.811429 kernel: audit: type=1325 audit(1707768117.753:1509): table=nat:148 family=2 entries=85 op=nft_register_chain pid=5522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.753000 audit[5522]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffc0bb8d730 a2=0 a3=7ffc0bb8d71c items=0 ppid=2681 pid=5522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:57.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:57.841000 audit[5548]: NETFILTER_CFG table=filter:149 family=2 entries=6 op=nft_register_rule pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.841000 audit[5548]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffec053c690 a2=0 a3=7ffec053c67c items=0 ppid=2681 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:57.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:57.846000 audit[5548]: NETFILTER_CFG table=nat:150 family=2 entries=92 op=nft_register_chain pid=5548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:01:57.846000 audit[5548]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffec053c690 a2=0 a3=7ffec053c67c items=0 ppid=2681 pid=5548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:01:57.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:01:57.904000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.904000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c014015c80 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.904000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:01:57.926000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.926000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.926000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c002ba01c0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.926000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:01:57.926000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013e21b00 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.926000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:01:57.930000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.930000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c013e21b90 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:01:57.935000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.935000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:01:57.935000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c013e21bc0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:01:57.935000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c002ba02a0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:01:57.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00106a0c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d6b080 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00106a2c0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d6b0a0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:01.922788 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.17JJiE.mount: Deactivated successfully. Feb 12 20:02:02.508450 env[1331]: time="2024-02-12T20:02:02.508394589Z" level=info msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.551 [WARNING][5585] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9acb1d2e-4b03-497d-9069-661e8dd819f2", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e", Pod:"coredns-787d4945fb-cc8zf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0aeb7cb596", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.551 [INFO][5585] k8s.go 578: Cleaning up netns ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.551 [INFO][5585] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" iface="eth0" netns="" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.551 [INFO][5585] k8s.go 585: Releasing IP address(es) ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.551 [INFO][5585] utils.go 188: Calico CNI releasing IP address ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.569 [INFO][5591] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.569 [INFO][5591] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.569 [INFO][5591] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.575 [WARNING][5591] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.575 [INFO][5591] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.577 [INFO][5591] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.578916 env[1331]: 2024-02-12 20:02:02.577 [INFO][5585] k8s.go 591: Teardown processing complete. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.579542 env[1331]: time="2024-02-12T20:02:02.579307322Z" level=info msg="TearDown network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" successfully" Feb 12 20:02:02.579542 env[1331]: time="2024-02-12T20:02:02.579351323Z" level=info msg="StopPodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" returns successfully" Feb 12 20:02:02.580064 env[1331]: time="2024-02-12T20:02:02.580032340Z" level=info msg="RemovePodSandbox for \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" Feb 12 20:02:02.580192 env[1331]: time="2024-02-12T20:02:02.580068840Z" level=info msg="Forcibly stopping sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\"" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.610 [WARNING][5609] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9acb1d2e-4b03-497d-9069-661e8dd819f2", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"08960f9dbf88256d17eec76481d196df1857ab7a5bffdeeb0507850205c48f1e", Pod:"coredns-787d4945fb-cc8zf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0aeb7cb596", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.610 [INFO][5609] k8s.go 578: Cleaning up netns ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.610 [INFO][5609] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" iface="eth0" netns="" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.610 [INFO][5609] k8s.go 585: Releasing IP address(es) ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.610 [INFO][5609] utils.go 188: Calico CNI releasing IP address ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.658 [INFO][5615] ipam_plugin.go 415: Releasing address using handleID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.659 [INFO][5615] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.659 [INFO][5615] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.665 [WARNING][5615] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.666 [INFO][5615] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" HandleID="k8s-pod-network.d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--cc8zf-eth0" Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.667 [INFO][5615] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.669073 env[1331]: 2024-02-12 20:02:02.668 [INFO][5609] k8s.go 591: Teardown processing complete. ContainerID="d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9" Feb 12 20:02:02.669793 env[1331]: time="2024-02-12T20:02:02.669105516Z" level=info msg="TearDown network for sandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" successfully" Feb 12 20:02:02.680887 env[1331]: time="2024-02-12T20:02:02.680840703Z" level=info msg="RemovePodSandbox \"d0cff184cedd584c20463a7b46af60c50619156d2410217397f1c10ce69269f9\" returns successfully" Feb 12 20:02:02.681311 env[1331]: time="2024-02-12T20:02:02.681283214Z" level=info msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.711 [WARNING][5634] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"26db85d3-fecd-4160-bd67-d63c2f2604e7", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95", Pod:"coredns-787d4945fb-tttbk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic4ac1a49ee9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.712 [INFO][5634] k8s.go 578: Cleaning up netns ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.712 [INFO][5634] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" iface="eth0" netns="" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.712 [INFO][5634] k8s.go 585: Releasing IP address(es) ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.712 [INFO][5634] utils.go 188: Calico CNI releasing IP address ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.729 [INFO][5640] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.729 [INFO][5640] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.729 [INFO][5640] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.735 [WARNING][5640] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.735 [INFO][5640] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.736 [INFO][5640] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.738813 env[1331]: 2024-02-12 20:02:02.737 [INFO][5634] k8s.go 591: Teardown processing complete. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.739435 env[1331]: time="2024-02-12T20:02:02.739401534Z" level=info msg="TearDown network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" successfully" Feb 12 20:02:02.739511 env[1331]: time="2024-02-12T20:02:02.739497036Z" level=info msg="StopPodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" returns successfully" Feb 12 20:02:02.740110 env[1331]: time="2024-02-12T20:02:02.740079050Z" level=info msg="RemovePodSandbox for \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" Feb 12 20:02:02.740221 env[1331]: time="2024-02-12T20:02:02.740113251Z" level=info msg="Forcibly stopping sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\"" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.771 [WARNING][5659] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"26db85d3-fecd-4160-bd67-d63c2f2604e7", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"0d7841e85fa77c9c7addecf47f224619eff9d16d277a9212aa5add14cc420e95", Pod:"coredns-787d4945fb-tttbk", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic4ac1a49ee9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.771 [INFO][5659] k8s.go 578: Cleaning up netns ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.771 [INFO][5659] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" iface="eth0" netns="" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.771 [INFO][5659] k8s.go 585: Releasing IP address(es) ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.771 [INFO][5659] utils.go 188: Calico CNI releasing IP address ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.790 [INFO][5665] ipam_plugin.go 415: Releasing address using handleID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.790 [INFO][5665] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.790 [INFO][5665] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.796 [WARNING][5665] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.796 [INFO][5665] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" HandleID="k8s-pod-network.d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Workload="ci--3510.3.2--a--996941d352-k8s-coredns--787d4945fb--tttbk-eth0" Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.798 [INFO][5665] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.799843 env[1331]: 2024-02-12 20:02:02.798 [INFO][5659] k8s.go 591: Teardown processing complete. ContainerID="d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b" Feb 12 20:02:02.800625 env[1331]: time="2024-02-12T20:02:02.799894712Z" level=info msg="TearDown network for sandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" successfully" Feb 12 20:02:02.812724 env[1331]: time="2024-02-12T20:02:02.812683525Z" level=info msg="RemovePodSandbox \"d5c839ab3c65e7d7622aad9e0666b762c52b88181656a1ceb4c488bbd19ebc6b\" returns successfully" Feb 12 20:02:02.813330 env[1331]: time="2024-02-12T20:02:02.813270739Z" level=info msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.844 [WARNING][5683] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dec3207f-864b-4d9d-b98a-dcf25643ac17", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf", Pod:"csi-node-driver-f9rqg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17201d2afaf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.844 [INFO][5683] k8s.go 578: Cleaning up netns ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.844 [INFO][5683] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" iface="eth0" netns="" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.844 [INFO][5683] k8s.go 585: Releasing IP address(es) ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.844 [INFO][5683] utils.go 188: Calico CNI releasing IP address ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.863 [INFO][5689] ipam_plugin.go 415: Releasing address using handleID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.863 [INFO][5689] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.863 [INFO][5689] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.869 [WARNING][5689] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.869 [INFO][5689] ipam_plugin.go 443: Releasing address using workloadID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.870 [INFO][5689] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.872628 env[1331]: 2024-02-12 20:02:02.871 [INFO][5683] k8s.go 591: Teardown processing complete. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.873271 env[1331]: time="2024-02-12T20:02:02.872664890Z" level=info msg="TearDown network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" successfully" Feb 12 20:02:02.873271 env[1331]: time="2024-02-12T20:02:02.872709091Z" level=info msg="StopPodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" returns successfully" Feb 12 20:02:02.873582 env[1331]: time="2024-02-12T20:02:02.873546312Z" level=info msg="RemovePodSandbox for \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" Feb 12 20:02:02.873726 env[1331]: time="2024-02-12T20:02:02.873677515Z" level=info msg="Forcibly stopping sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\"" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.909 [WARNING][5709] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dec3207f-864b-4d9d-b98a-dcf25643ac17", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"bcefe4075c32b76dd8c8459c6812ef7de1c0e1ef2bd5f24f7914c6d96b891abf", Pod:"csi-node-driver-f9rqg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali17201d2afaf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.909 [INFO][5709] k8s.go 578: Cleaning up netns ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.909 [INFO][5709] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" iface="eth0" netns="" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.910 [INFO][5709] k8s.go 585: Releasing IP address(es) ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.910 [INFO][5709] utils.go 188: Calico CNI releasing IP address ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.927 [INFO][5715] ipam_plugin.go 415: Releasing address using handleID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.927 [INFO][5715] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.927 [INFO][5715] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.933 [WARNING][5715] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.933 [INFO][5715] ipam_plugin.go 443: Releasing address using workloadID ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" HandleID="k8s-pod-network.412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Workload="ci--3510.3.2--a--996941d352-k8s-csi--node--driver--f9rqg-eth0" Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.934 [INFO][5715] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:02.936628 env[1331]: 2024-02-12 20:02:02.935 [INFO][5709] k8s.go 591: Teardown processing complete. ContainerID="412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748" Feb 12 20:02:02.937340 env[1331]: time="2024-02-12T20:02:02.936684655Z" level=info msg="TearDown network for sandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" successfully" Feb 12 20:02:02.948016 env[1331]: time="2024-02-12T20:02:02.947974431Z" level=info msg="RemovePodSandbox \"412f4319ae3285e7d40ac1457bd2b7dc5e819be0712d83664edfad021e116748\" returns successfully" Feb 12 20:02:02.948583 env[1331]: time="2024-02-12T20:02:02.948550545Z" level=info msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:02.993 [WARNING][5733] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0", GenerateName:"calico-kube-controllers-57ff975f4d-", Namespace:"calico-system", SelfLink:"", UID:"f16b1ff4-03e0-4c63-900d-663eb34e2e55", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57ff975f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7", Pod:"calico-kube-controllers-57ff975f4d-4l2gq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d40b1b13af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:02.994 [INFO][5733] k8s.go 578: Cleaning up netns ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:02.994 [INFO][5733] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" iface="eth0" netns="" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:02.994 [INFO][5733] k8s.go 585: Releasing IP address(es) ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:02.994 [INFO][5733] utils.go 188: Calico CNI releasing IP address ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.010 [INFO][5740] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.010 [INFO][5740] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.011 [INFO][5740] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.017 [WARNING][5740] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.017 [INFO][5740] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.018 [INFO][5740] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:03.020389 env[1331]: 2024-02-12 20:02:03.019 [INFO][5733] k8s.go 591: Teardown processing complete. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.021035 env[1331]: time="2024-02-12T20:02:03.020432796Z" level=info msg="TearDown network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" successfully" Feb 12 20:02:03.021035 env[1331]: time="2024-02-12T20:02:03.020471897Z" level=info msg="StopPodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" returns successfully" Feb 12 20:02:03.021370 env[1331]: time="2024-02-12T20:02:03.021338518Z" level=info msg="RemovePodSandbox for \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" Feb 12 20:02:03.021484 env[1331]: time="2024-02-12T20:02:03.021376019Z" level=info msg="Forcibly stopping sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\"" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.052 [WARNING][5758] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0", GenerateName:"calico-kube-controllers-57ff975f4d-", Namespace:"calico-system", SelfLink:"", UID:"f16b1ff4-03e0-4c63-900d-663eb34e2e55", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 0, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"57ff975f4d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-996941d352", ContainerID:"ff413f33df50f0c6d4aa6228f9230b84d23354f131492d910602eef4ba30e8f7", Pod:"calico-kube-controllers-57ff975f4d-4l2gq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d40b1b13af", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.052 [INFO][5758] k8s.go 578: Cleaning up netns ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.052 [INFO][5758] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" iface="eth0" netns="" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.053 [INFO][5758] k8s.go 585: Releasing IP address(es) ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.053 [INFO][5758] utils.go 188: Calico CNI releasing IP address ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.070 [INFO][5764] ipam_plugin.go 415: Releasing address using handleID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.070 [INFO][5764] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.070 [INFO][5764] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.076 [WARNING][5764] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.076 [INFO][5764] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" HandleID="k8s-pod-network.c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Workload="ci--3510.3.2--a--996941d352-k8s-calico--kube--controllers--57ff975f4d--4l2gq-eth0" Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.077 [INFO][5764] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:02:03.079924 env[1331]: 2024-02-12 20:02:03.078 [INFO][5758] k8s.go 591: Teardown processing complete. ContainerID="c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38" Feb 12 20:02:03.080910 env[1331]: time="2024-02-12T20:02:03.080871656Z" level=info msg="TearDown network for sandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" successfully" Feb 12 20:02:03.091012 env[1331]: time="2024-02-12T20:02:03.090960600Z" level=info msg="RemovePodSandbox \"c1ecb2674c25ec64d5773d3caeb1b710a7181bd8e123422f67e033b6d214af38\" returns successfully" Feb 12 20:02:19.555203 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.fUzWEI.mount: Deactivated successfully. Feb 12 20:02:27.613315 systemd[1]: run-containerd-runc-k8s.io-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f-runc.emUApG.mount: Deactivated successfully. Feb 12 20:02:31.922584 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.HBeMwh.mount: Deactivated successfully. Feb 12 20:02:34.997000 audit[5297]: AVC avc: denied { watch } for pid=5297 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.3562585575/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c849 tclass=file permissive=0 Feb 12 20:02:35.003437 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 12 20:02:35.003576 kernel: audit: type=1400 audit(1707768154.997:1522): avc: denied { watch } for pid=5297 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.3562585575/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c849 tclass=file permissive=0 Feb 12 20:02:34.997000 audit[5297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018e6660 a2=fc6 a3=0 items=0 ppid=5169 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 key=(null) Feb 12 20:02:35.023260 kernel: audit: type=1300 audit(1707768154.997:1522): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0018e6660 a2=fc6 a3=0 items=0 ppid=5169 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 key=(null) Feb 12 20:02:34.997000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:02:35.043257 kernel: audit: type=1327 audit(1707768154.997:1522): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:02:35.687000 audit[5345]: AVC avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:02:35.709066 kernel: audit: type=1400 audit(1707768155.687:1523): avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:02:35.709207 kernel: audit: type=1300 audit(1707768155.687:1523): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a3a420 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:02:35.687000 audit[5345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a3a420 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:02:35.687000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:02:35.728361 kernel: audit: type=1327 audit(1707768155.687:1523): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:02:44.621391 update_engine[1319]: I0212 20:02:44.621342 1319 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 12 20:02:44.621391 update_engine[1319]: I0212 20:02:44.621382 1319 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 12 20:02:44.621958 update_engine[1319]: I0212 20:02:44.621531 1319 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 12 20:02:44.622120 update_engine[1319]: I0212 20:02:44.622026 1319 omaha_request_params.cc:62] Current group set to lts Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622215 1319 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622242 1319 update_attempter.cc:643] Scheduling an action processor start. Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622262 1319 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622299 1319 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622365 1319 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622371 1319 omaha_request_action.cc:271] Request: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: Feb 12 20:02:44.622446 update_engine[1319]: I0212 20:02:44.622376 1319 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 20:02:44.623406 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 12 20:02:44.624114 update_engine[1319]: I0212 20:02:44.623695 1319 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 20:02:44.624114 update_engine[1319]: I0212 20:02:44.623951 1319 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 20:02:44.675546 systemd[1]: Started sshd@7-10.200.8.17:22-10.200.12.6:37894.service. Feb 12 20:02:44.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:44.694261 kernel: audit: type=1130 audit(1707768164.675:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:44.696488 update_engine[1319]: E0212 20:02:44.696327 1319 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 20:02:44.696488 update_engine[1319]: I0212 20:02:44.696471 1319 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 12 20:02:45.305000 audit[5887]: USER_ACCT pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.305894 sshd[5887]: Accepted publickey for core from 10.200.12.6 port 37894 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:02:45.325000 audit[5887]: CRED_ACQ pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.343792 kernel: audit: type=1101 audit(1707768165.305:1525): pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.343859 kernel: audit: type=1103 audit(1707768165.325:1526): pid=5887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.343881 kernel: audit: type=1006 audit(1707768165.325:1527): pid=5887 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 20:02:45.326477 sshd[5887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:02:45.332125 systemd[1]: Started session-10.scope. Feb 12 20:02:45.333117 systemd-logind[1316]: New session 10 of user core. Feb 12 20:02:45.325000 audit[5887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1fb4270 a2=3 a3=0 items=0 ppid=1 pid=5887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:02:45.355267 kernel: audit: type=1300 audit(1707768165.325:1527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea1fb4270 a2=3 a3=0 items=0 ppid=1 pid=5887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:02:45.325000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:02:45.379571 kernel: audit: type=1327 audit(1707768165.325:1527): proctitle=737368643A20636F7265205B707269765D Feb 12 20:02:45.337000 audit[5887]: USER_START pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.380301 kernel: audit: type=1105 audit(1707768165.337:1528): pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.340000 audit[5889]: CRED_ACQ pid=5889 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.415908 kernel: audit: type=1103 audit(1707768165.340:1529): pid=5889 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.855846 sshd[5887]: pam_unix(sshd:session): session closed for user core Feb 12 20:02:45.857000 audit[5887]: USER_END pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.860195 systemd-logind[1316]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:02:45.861830 systemd[1]: sshd@7-10.200.8.17:22-10.200.12.6:37894.service: Deactivated successfully. Feb 12 20:02:45.862792 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:02:45.864385 systemd-logind[1316]: Removed session 10. Feb 12 20:02:45.857000 audit[5887]: CRED_DISP pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.896642 kernel: audit: type=1106 audit(1707768165.857:1530): pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.896782 kernel: audit: type=1104 audit(1707768165.857:1531): pid=5887 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:45.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.17:22-10.200.12.6:37894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:49.558668 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.DT9xyi.mount: Deactivated successfully. Feb 12 20:02:50.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:39432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:50.964766 systemd[1]: Started sshd@8-10.200.8.17:22-10.200.12.6:39432.service. Feb 12 20:02:50.971620 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:02:50.971735 kernel: audit: type=1130 audit(1707768170.964:1533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:39432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:51.594000 audit[5940]: USER_ACCT pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.595421 sshd[5940]: Accepted publickey for core from 10.200.12.6 port 39432 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:02:51.617289 kernel: audit: type=1101 audit(1707768171.594:1534): pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.617567 sshd[5940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:02:51.616000 audit[5940]: CRED_ACQ pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.624061 systemd[1]: Started session-11.scope. Feb 12 20:02:51.625647 systemd-logind[1316]: New session 11 of user core. Feb 12 20:02:51.635416 kernel: audit: type=1103 audit(1707768171.616:1535): pid=5940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.616000 audit[5940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b055610 a2=3 a3=0 items=0 ppid=1 pid=5940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:02:51.647321 kernel: audit: type=1006 audit(1707768171.616:1536): pid=5940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 20:02:51.647377 kernel: audit: type=1300 audit(1707768171.616:1536): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b055610 a2=3 a3=0 items=0 ppid=1 pid=5940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:02:51.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:02:51.665274 kernel: audit: type=1327 audit(1707768171.616:1536): proctitle=737368643A20636F7265205B707269765D Feb 12 20:02:51.628000 audit[5940]: USER_START pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.689355 kernel: audit: type=1105 audit(1707768171.628:1537): pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.635000 audit[5942]: CRED_ACQ pid=5942 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:51.706613 kernel: audit: type=1103 audit(1707768171.635:1538): pid=5942 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:52.096696 sshd[5940]: pam_unix(sshd:session): session closed for user core Feb 12 20:02:52.097000 audit[5940]: USER_END pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:52.100119 systemd[1]: sshd@8-10.200.8.17:22-10.200.12.6:39432.service: Deactivated successfully. Feb 12 20:02:52.100990 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:02:52.102745 systemd-logind[1316]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:02:52.103727 systemd-logind[1316]: Removed session 11. Feb 12 20:02:52.119252 kernel: audit: type=1106 audit(1707768172.097:1539): pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:52.119399 kernel: audit: type=1104 audit(1707768172.098:1540): pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:52.098000 audit[5940]: CRED_DISP pid=5940 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:52.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.17:22-10.200.12.6:39432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:54.552453 update_engine[1319]: I0212 20:02:54.552387 1319 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 20:02:54.552991 update_engine[1319]: I0212 20:02:54.552709 1319 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 20:02:54.553067 update_engine[1319]: I0212 20:02:54.552990 1319 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 20:02:54.581391 update_engine[1319]: E0212 20:02:54.581331 1319 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 20:02:54.581595 update_engine[1319]: I0212 20:02:54.581494 1319 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 12 20:02:56.810000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:56.815389 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:02:56.815519 kernel: audit: type=1400 audit(1707768176.810:1543): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:56.810000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:56.849020 kernel: audit: type=1400 audit(1707768176.810:1542): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:56.849160 kernel: audit: type=1300 audit(1707768176.810:1543): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001540aa0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:56.810000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001540aa0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:56.810000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:56.810000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002564780 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:56.913354 kernel: audit: type=1327 audit(1707768176.810:1543): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:56.913504 kernel: audit: type=1300 audit(1707768176.810:1542): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002564780 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:02:56.913531 kernel: audit: type=1327 audit(1707768176.810:1542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:56.810000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:02:57.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:34372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:57.205396 systemd[1]: Started sshd@9-10.200.8.17:22-10.200.12.6:34372.service. Feb 12 20:02:57.224437 kernel: audit: type=1130 audit(1707768177.204:1544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:34372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:57.610209 systemd[1]: run-containerd-runc-k8s.io-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f-runc.kfGyXU.mount: Deactivated successfully. Feb 12 20:02:57.823000 audit[5953]: USER_ACCT pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.846256 kernel: audit: type=1101 audit(1707768177.823:1545): pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.826753 sshd[5953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:02:57.846679 sshd[5953]: Accepted publickey for core from 10.200.12.6 port 34372 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:02:57.825000 audit[5953]: CRED_ACQ pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.857503 systemd[1]: Started session-12.scope. Feb 12 20:02:57.858819 systemd-logind[1316]: New session 12 of user core. Feb 12 20:02:57.876687 kernel: audit: type=1103 audit(1707768177.825:1546): pid=5953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.876877 kernel: audit: type=1006 audit(1707768177.825:1547): pid=5953 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 20:02:57.825000 audit[5953]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4f5d2790 a2=3 a3=0 items=0 ppid=1 pid=5953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:02:57.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:02:57.864000 audit[5953]: USER_START pid=5953 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.864000 audit[5994]: CRED_ACQ pid=5994 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:57.903000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.903000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0087cc810 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:57.926000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.926000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c012c28940 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.926000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:57.927000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.927000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c002556120 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.927000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:57.930000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.930000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0087cc8a0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.930000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:57.934000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.934000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0018d9dc0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:57.935000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:02:57.935000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0025563f0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:02:57.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:02:58.338473 sshd[5953]: pam_unix(sshd:session): session closed for user core Feb 12 20:02:58.338000 audit[5953]: USER_END pid=5953 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:58.339000 audit[5953]: CRED_DISP pid=5953 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:02:58.341890 systemd[1]: sshd@9-10.200.8.17:22-10.200.12.6:34372.service: Deactivated successfully. Feb 12 20:02:58.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.17:22-10.200.12.6:34372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:02:58.342931 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:02:58.343764 systemd-logind[1316]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:02:58.345266 systemd-logind[1316]: Removed session 12. Feb 12 20:03:01.127000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:01.127000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:01.127000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001540d80 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:01.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:01.127000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:01.127000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001540da0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:01.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:01.127000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001430e00 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:01.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:01.127000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:01.127000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001430e80 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:01.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:03.445609 systemd[1]: Started sshd@10-10.200.8.17:22-10.200.12.6:34374.service. Feb 12 20:03:03.469381 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 12 20:03:03.469508 kernel: audit: type=1130 audit(1707768183.445:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:34374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:03.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:34374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:04.063000 audit[6027]: USER_ACCT pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.064836 sshd[6027]: Accepted publickey for core from 10.200.12.6 port 34374 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:04.082000 audit[6027]: CRED_ACQ pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.084727 sshd[6027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:04.089441 systemd-logind[1316]: New session 13 of user core. Feb 12 20:03:04.092166 systemd[1]: Started session-13.scope. Feb 12 20:03:04.102891 kernel: audit: type=1101 audit(1707768184.063:1564): pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.105527 kernel: audit: type=1103 audit(1707768184.082:1565): pid=6027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.105636 kernel: audit: type=1006 audit(1707768184.083:1566): pid=6027 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 20:03:04.083000 audit[6027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8502c3f0 a2=3 a3=0 items=0 ppid=1 pid=6027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:04.138274 kernel: audit: type=1300 audit(1707768184.083:1566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8502c3f0 a2=3 a3=0 items=0 ppid=1 pid=6027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:04.138421 kernel: audit: type=1327 audit(1707768184.083:1566): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:04.083000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:04.103000 audit[6027]: USER_START pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.141287 kernel: audit: type=1105 audit(1707768184.103:1567): pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.129000 audit[6029]: CRED_ACQ pid=6029 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.176440 kernel: audit: type=1103 audit(1707768184.129:1568): pid=6029 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.552772 update_engine[1319]: I0212 20:03:04.552708 1319 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 20:03:04.553208 update_engine[1319]: I0212 20:03:04.552986 1319 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 20:03:04.553291 update_engine[1319]: I0212 20:03:04.553210 1319 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 20:03:04.573140 sshd[6027]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:04.573000 audit[6027]: USER_END pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.576344 systemd[1]: sshd@10-10.200.8.17:22-10.200.12.6:34374.service: Deactivated successfully. Feb 12 20:03:04.577172 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:03:04.578807 systemd-logind[1316]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:03:04.579786 systemd-logind[1316]: Removed session 13. Feb 12 20:03:04.573000 audit[6027]: CRED_DISP pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.596257 kernel: audit: type=1106 audit(1707768184.573:1569): pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.596346 kernel: audit: type=1104 audit(1707768184.573:1570): pid=6027 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:04.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.17:22-10.200.12.6:34374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:04.624350 update_engine[1319]: E0212 20:03:04.624094 1319 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 20:03:04.624350 update_engine[1319]: I0212 20:03:04.624297 1319 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 12 20:03:09.678534 systemd[1]: Started sshd@11-10.200.8.17:22-10.200.12.6:53972.service. Feb 12 20:03:09.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:53972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:09.684557 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:03:09.684669 kernel: audit: type=1130 audit(1707768189.678:1572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:53972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:10.290000 audit[6061]: USER_ACCT pid=6061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.292409 sshd[6061]: Accepted publickey for core from 10.200.12.6 port 53972 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:10.311000 audit[6061]: CRED_ACQ pid=6061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.313044 sshd[6061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:10.317806 systemd-logind[1316]: New session 14 of user core. Feb 12 20:03:10.320993 systemd[1]: Started session-14.scope. Feb 12 20:03:10.330120 kernel: audit: type=1101 audit(1707768190.290:1573): pid=6061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.330219 kernel: audit: type=1103 audit(1707768190.311:1574): pid=6061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.330267 kernel: audit: type=1006 audit(1707768190.311:1575): pid=6061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 20:03:10.311000 audit[6061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe58234d0 a2=3 a3=0 items=0 ppid=1 pid=6061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:10.359461 kernel: audit: type=1300 audit(1707768190.311:1575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe58234d0 a2=3 a3=0 items=0 ppid=1 pid=6061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:10.359671 kernel: audit: type=1327 audit(1707768190.311:1575): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:10.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:10.369260 kernel: audit: type=1105 audit(1707768190.325:1576): pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.325000 audit[6061]: USER_START pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.327000 audit[6063]: CRED_ACQ pid=6063 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.385263 kernel: audit: type=1103 audit(1707768190.327:1577): pid=6063 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.812367 sshd[6061]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:10.812000 audit[6061]: USER_END pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.816304 systemd-logind[1316]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:03:10.817999 systemd[1]: sshd@11-10.200.8.17:22-10.200.12.6:53972.service: Deactivated successfully. Feb 12 20:03:10.818951 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:03:10.820915 systemd-logind[1316]: Removed session 14. Feb 12 20:03:10.813000 audit[6061]: CRED_DISP pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.834250 kernel: audit: type=1106 audit(1707768190.812:1578): pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.834313 kernel: audit: type=1104 audit(1707768190.813:1579): pid=6061 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:10.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.17:22-10.200.12.6:53972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:10.918699 systemd[1]: Started sshd@12-10.200.8.17:22-10.200.12.6:53980.service. Feb 12 20:03:10.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:53980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:11.534000 audit[6073]: USER_ACCT pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:11.536428 sshd[6073]: Accepted publickey for core from 10.200.12.6 port 53980 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:11.536000 audit[6073]: CRED_ACQ pid=6073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:11.538339 sshd[6073]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:11.536000 audit[6073]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaac2b9f0 a2=3 a3=0 items=0 ppid=1 pid=6073 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:11.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:11.544906 systemd[1]: Started session-15.scope. Feb 12 20:03:11.545740 systemd-logind[1316]: New session 15 of user core. Feb 12 20:03:11.550000 audit[6073]: USER_START pid=6073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:11.551000 audit[6075]: CRED_ACQ pid=6075 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.034110 sshd[6073]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:13.035000 audit[6073]: USER_END pid=6073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.035000 audit[6073]: CRED_DISP pid=6073 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.038156 systemd[1]: sshd@12-10.200.8.17:22-10.200.12.6:53980.service: Deactivated successfully. Feb 12 20:03:13.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.17:22-10.200.12.6:53980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:13.039395 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:03:13.040361 systemd-logind[1316]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:03:13.041400 systemd-logind[1316]: Removed session 15. Feb 12 20:03:13.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.17:22-10.200.12.6:53990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:13.139130 systemd[1]: Started sshd@13-10.200.8.17:22-10.200.12.6:53990.service. Feb 12 20:03:13.757000 audit[6085]: USER_ACCT pid=6085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.760083 sshd[6085]: Accepted publickey for core from 10.200.12.6 port 53990 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:13.759000 audit[6085]: CRED_ACQ pid=6085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.759000 audit[6085]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc429ce210 a2=3 a3=0 items=0 ppid=1 pid=6085 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:13.759000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:13.760830 sshd[6085]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:13.766608 systemd-logind[1316]: New session 16 of user core. Feb 12 20:03:13.767110 systemd[1]: Started session-16.scope. Feb 12 20:03:13.770000 audit[6085]: USER_START pid=6085 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:13.772000 audit[6087]: CRED_ACQ pid=6087 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:14.252903 sshd[6085]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:14.253000 audit[6085]: USER_END pid=6085 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:14.253000 audit[6085]: CRED_DISP pid=6085 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:14.255812 systemd[1]: sshd@13-10.200.8.17:22-10.200.12.6:53990.service: Deactivated successfully. Feb 12 20:03:14.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.17:22-10.200.12.6:53990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:14.257132 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:03:14.257630 systemd-logind[1316]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:03:14.258530 systemd-logind[1316]: Removed session 16. Feb 12 20:03:14.551834 update_engine[1319]: I0212 20:03:14.551776 1319 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 20:03:14.552316 update_engine[1319]: I0212 20:03:14.552040 1319 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 20:03:14.552316 update_engine[1319]: I0212 20:03:14.552297 1319 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 20:03:14.572930 update_engine[1319]: E0212 20:03:14.572885 1319 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 20:03:14.573098 update_engine[1319]: I0212 20:03:14.573005 1319 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 20:03:14.573098 update_engine[1319]: I0212 20:03:14.573015 1319 omaha_request_action.cc:621] Omaha request response: Feb 12 20:03:14.573209 update_engine[1319]: E0212 20:03:14.573100 1319 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573115 1319 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573119 1319 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573124 1319 update_attempter.cc:306] Processing Done. Feb 12 20:03:14.573209 update_engine[1319]: E0212 20:03:14.573139 1319 update_attempter.cc:619] Update failed. Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573145 1319 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573150 1319 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 12 20:03:14.573209 update_engine[1319]: I0212 20:03:14.573156 1319 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 12 20:03:14.573547 update_engine[1319]: I0212 20:03:14.573271 1319 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 12 20:03:14.573547 update_engine[1319]: I0212 20:03:14.573298 1319 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 12 20:03:14.573547 update_engine[1319]: I0212 20:03:14.573303 1319 omaha_request_action.cc:271] Request: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: Feb 12 20:03:14.573547 update_engine[1319]: I0212 20:03:14.573309 1319 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 12 20:03:14.573547 update_engine[1319]: I0212 20:03:14.573477 1319 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 12 20:03:14.573927 update_engine[1319]: I0212 20:03:14.573649 1319 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 12 20:03:14.574116 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 12 20:03:14.596650 update_engine[1319]: E0212 20:03:14.596601 1319 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596750 1319 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596765 1319 omaha_request_action.cc:621] Omaha request response: Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596772 1319 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596776 1319 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596781 1319 update_attempter.cc:306] Processing Done. Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596787 1319 update_attempter.cc:310] Error event sent. Feb 12 20:03:14.596880 update_engine[1319]: I0212 20:03:14.596800 1319 update_check_scheduler.cc:74] Next update check in 45m24s Feb 12 20:03:14.597307 locksmithd[1413]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 12 20:03:19.360661 systemd[1]: Started sshd@14-10.200.8.17:22-10.200.12.6:47562.service. Feb 12 20:03:19.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.17:22-10.200.12.6:47562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:19.385758 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 20:03:19.385901 kernel: audit: type=1130 audit(1707768199.360:1599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.17:22-10.200.12.6:47562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:19.561447 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.odlRFU.mount: Deactivated successfully. Feb 12 20:03:19.986000 audit[6099]: USER_ACCT pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:19.989727 sshd[6099]: Accepted publickey for core from 10.200.12.6 port 47562 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:20.007252 kernel: audit: type=1101 audit(1707768199.986:1600): pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.006000 audit[6099]: CRED_ACQ pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.007945 sshd[6099]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:20.013635 systemd[1]: Started session-17.scope. Feb 12 20:03:20.014504 systemd-logind[1316]: New session 17 of user core. Feb 12 20:03:20.026410 kernel: audit: type=1103 audit(1707768200.006:1601): pid=6099 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.026515 kernel: audit: type=1006 audit(1707768200.006:1602): pid=6099 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 20:03:20.006000 audit[6099]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62e806a0 a2=3 a3=0 items=0 ppid=1 pid=6099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:20.036408 kernel: audit: type=1300 audit(1707768200.006:1602): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62e806a0 a2=3 a3=0 items=0 ppid=1 pid=6099 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:20.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:20.054259 kernel: audit: type=1327 audit(1707768200.006:1602): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:20.020000 audit[6099]: USER_START pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.060255 kernel: audit: type=1105 audit(1707768200.020:1603): pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.022000 audit[6128]: CRED_ACQ pid=6128 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.095978 kernel: audit: type=1103 audit(1707768200.022:1604): pid=6128 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.499365 sshd[6099]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:20.499000 audit[6099]: USER_END pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.503130 systemd[1]: sshd@14-10.200.8.17:22-10.200.12.6:47562.service: Deactivated successfully. Feb 12 20:03:20.503982 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:03:20.505487 systemd-logind[1316]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:03:20.506441 systemd-logind[1316]: Removed session 17. Feb 12 20:03:20.500000 audit[6099]: CRED_DISP pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.536394 kernel: audit: type=1106 audit(1707768200.499:1605): pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.536467 kernel: audit: type=1104 audit(1707768200.500:1606): pid=6099 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:20.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.17:22-10.200.12.6:47562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:25.606620 systemd[1]: Started sshd@15-10.200.8.17:22-10.200.12.6:47568.service. Feb 12 20:03:25.625047 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:03:25.625145 kernel: audit: type=1130 audit(1707768205.605:1608): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.17:22-10.200.12.6:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:25.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.17:22-10.200.12.6:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:26.230000 audit[6139]: USER_ACCT pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.253345 kernel: audit: type=1101 audit(1707768206.230:1609): pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.233372 sshd[6139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:26.253765 sshd[6139]: Accepted publickey for core from 10.200.12.6 port 47568 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:26.231000 audit[6139]: CRED_ACQ pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.260020 systemd[1]: Started session-18.scope. Feb 12 20:03:26.261500 systemd-logind[1316]: New session 18 of user core. Feb 12 20:03:26.273272 kernel: audit: type=1103 audit(1707768206.231:1610): pid=6139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.231000 audit[6139]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3773be20 a2=3 a3=0 items=0 ppid=1 pid=6139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:26.287266 kernel: audit: type=1006 audit(1707768206.231:1611): pid=6139 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 20:03:26.287315 kernel: audit: type=1300 audit(1707768206.231:1611): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3773be20 a2=3 a3=0 items=0 ppid=1 pid=6139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:26.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:26.305331 kernel: audit: type=1327 audit(1707768206.231:1611): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:26.266000 audit[6139]: USER_START pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.329995 kernel: audit: type=1105 audit(1707768206.266:1612): pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.330138 kernel: audit: type=1103 audit(1707768206.274:1613): pid=6142 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.274000 audit[6142]: CRED_ACQ pid=6142 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.745987 sshd[6139]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:26.746000 audit[6139]: USER_END pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.749346 systemd[1]: sshd@15-10.200.8.17:22-10.200.12.6:47568.service: Deactivated successfully. Feb 12 20:03:26.750881 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:03:26.752472 systemd-logind[1316]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:03:26.753496 systemd-logind[1316]: Removed session 18. Feb 12 20:03:26.770264 kernel: audit: type=1106 audit(1707768206.746:1614): pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.770385 kernel: audit: type=1104 audit(1707768206.746:1615): pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.746000 audit[6139]: CRED_DISP pid=6139 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:26.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.17:22-10.200.12.6:47568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:27.608142 systemd[1]: run-containerd-runc-k8s.io-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f-runc.n5AI34.mount: Deactivated successfully. Feb 12 20:03:27.623697 systemd[1]: run-containerd-runc-k8s.io-d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d-runc.SEqx7p.mount: Deactivated successfully. Feb 12 20:03:31.854796 systemd[1]: Started sshd@16-10.200.8.17:22-10.200.12.6:54322.service. Feb 12 20:03:31.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.17:22-10.200.12.6:54322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:31.860946 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:03:31.861037 kernel: audit: type=1130 audit(1707768211.854:1617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.17:22-10.200.12.6:54322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:31.931805 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.0QW6js.mount: Deactivated successfully. Feb 12 20:03:32.478000 audit[6191]: USER_ACCT pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.481955 sshd[6191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:32.500195 sshd[6191]: Accepted publickey for core from 10.200.12.6 port 54322 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:32.500423 kernel: audit: type=1101 audit(1707768212.478:1618): pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.480000 audit[6191]: CRED_ACQ pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.505885 systemd[1]: Started session-19.scope. Feb 12 20:03:32.507111 systemd-logind[1316]: New session 19 of user core. Feb 12 20:03:32.527935 kernel: audit: type=1103 audit(1707768212.480:1619): pid=6191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.528108 kernel: audit: type=1006 audit(1707768212.480:1620): pid=6191 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 20:03:32.528137 kernel: audit: type=1300 audit(1707768212.480:1620): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbcded40 a2=3 a3=0 items=0 ppid=1 pid=6191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:32.480000 audit[6191]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbcded40 a2=3 a3=0 items=0 ppid=1 pid=6191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:32.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:32.555131 kernel: audit: type=1327 audit(1707768212.480:1620): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:32.555284 kernel: audit: type=1105 audit(1707768212.509:1621): pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.509000 audit[6191]: USER_START pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.574686 kernel: audit: type=1103 audit(1707768212.509:1622): pid=6215 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.509000 audit[6215]: CRED_ACQ pid=6215 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.998307 sshd[6191]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:32.998000 audit[6191]: USER_END pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.001767 systemd[1]: sshd@16-10.200.8.17:22-10.200.12.6:54322.service: Deactivated successfully. Feb 12 20:03:33.002560 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:03:33.004299 systemd-logind[1316]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:03:33.005190 systemd-logind[1316]: Removed session 19. Feb 12 20:03:32.999000 audit[6191]: CRED_DISP pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.037049 kernel: audit: type=1106 audit(1707768212.998:1623): pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.037444 kernel: audit: type=1104 audit(1707768212.999:1624): pid=6191 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:32.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.17:22-10.200.12.6:54322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:33.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.17:22-10.200.12.6:54324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:33.104029 systemd[1]: Started sshd@17-10.200.8.17:22-10.200.12.6:54324.service. Feb 12 20:03:33.736000 audit[6225]: USER_ACCT pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.737637 sshd[6225]: Accepted publickey for core from 10.200.12.6 port 54324 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:33.737000 audit[6225]: CRED_ACQ pid=6225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.737000 audit[6225]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5cd6df60 a2=3 a3=0 items=0 ppid=1 pid=6225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:33.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:33.739045 sshd[6225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:33.744177 systemd[1]: Started session-20.scope. Feb 12 20:03:33.744841 systemd-logind[1316]: New session 20 of user core. Feb 12 20:03:33.748000 audit[6225]: USER_START pid=6225 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:33.749000 audit[6227]: CRED_ACQ pid=6227 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:34.293103 sshd[6225]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:34.293000 audit[6225]: USER_END pid=6225 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:34.293000 audit[6225]: CRED_DISP pid=6225 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:34.296553 systemd[1]: sshd@17-10.200.8.17:22-10.200.12.6:54324.service: Deactivated successfully. Feb 12 20:03:34.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.17:22-10.200.12.6:54324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:34.297630 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:03:34.298316 systemd-logind[1316]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:03:34.299044 systemd-logind[1316]: Removed session 20. Feb 12 20:03:34.399044 systemd[1]: Started sshd@18-10.200.8.17:22-10.200.12.6:54332.service. Feb 12 20:03:34.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.17:22-10.200.12.6:54332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:34.998000 audit[5297]: AVC avc: denied { watch } for pid=5297 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.3562585575/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c849 tclass=file permissive=0 Feb 12 20:03:34.998000 audit[5297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a18060 a2=fc6 a3=0 items=0 ppid=5169 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 key=(null) Feb 12 20:03:34.998000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:03:35.016000 audit[6235]: USER_ACCT pid=6235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:35.017508 sshd[6235]: Accepted publickey for core from 10.200.12.6 port 54332 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:35.017000 audit[6235]: CRED_ACQ pid=6235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:35.017000 audit[6235]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe369bb9a0 a2=3 a3=0 items=0 ppid=1 pid=6235 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:35.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:35.018942 sshd[6235]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:35.024095 systemd-logind[1316]: New session 21 of user core. Feb 12 20:03:35.024984 systemd[1]: Started session-21.scope. Feb 12 20:03:35.028000 audit[6235]: USER_START pid=6235 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:35.030000 audit[6237]: CRED_ACQ pid=6237 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:35.688000 audit[5345]: AVC avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:03:35.688000 audit[5345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001cd2fa0 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:03:35.688000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:03:36.550000 audit[6271]: NETFILTER_CFG table=filter:151 family=2 entries=18 op=nft_register_rule pid=6271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:36.550000 audit[6271]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe94dabd00 a2=0 a3=7ffe94dabcec items=0 ppid=2681 pid=6271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:36.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:36.552000 audit[6271]: NETFILTER_CFG table=nat:152 family=2 entries=94 op=nft_register_rule pid=6271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:36.552000 audit[6271]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe94dabd00 a2=0 a3=7ffe94dabcec items=0 ppid=2681 pid=6271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:36.552000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:36.575401 sshd[6235]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:36.575000 audit[6235]: USER_END pid=6235 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:36.575000 audit[6235]: CRED_DISP pid=6235 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:36.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.17:22-10.200.12.6:54332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:36.578576 systemd[1]: sshd@18-10.200.8.17:22-10.200.12.6:54332.service: Deactivated successfully. Feb 12 20:03:36.580730 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:03:36.581858 systemd-logind[1316]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:03:36.582993 systemd-logind[1316]: Removed session 21. Feb 12 20:03:36.605000 audit[6298]: NETFILTER_CFG table=filter:153 family=2 entries=30 op=nft_register_rule pid=6298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:36.605000 audit[6298]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd0efb7cd0 a2=0 a3=7ffd0efb7cbc items=0 ppid=2681 pid=6298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:36.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:36.607000 audit[6298]: NETFILTER_CFG table=nat:154 family=2 entries=94 op=nft_register_rule pid=6298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:36.607000 audit[6298]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd0efb7cd0 a2=0 a3=7ffd0efb7cbc items=0 ppid=2681 pid=6298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:36.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:36.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.17:22-10.200.12.6:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:36.682726 systemd[1]: Started sshd@19-10.200.8.17:22-10.200.12.6:54338.service. Feb 12 20:03:37.323211 kernel: kauditd_printk_skb: 42 callbacks suppressed Feb 12 20:03:37.323355 kernel: audit: type=1101 audit(1707768217.316:1651): pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.316000 audit[6300]: USER_ACCT pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.319005 sshd[6300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:37.323699 sshd[6300]: Accepted publickey for core from 10.200.12.6 port 54338 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:37.328381 systemd[1]: Started session-22.scope. Feb 12 20:03:37.329911 systemd-logind[1316]: New session 22 of user core. Feb 12 20:03:37.317000 audit[6300]: CRED_ACQ pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.368817 kernel: audit: type=1103 audit(1707768217.317:1652): pid=6300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.368980 kernel: audit: type=1006 audit(1707768217.317:1653): pid=6300 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 20:03:37.369021 kernel: audit: type=1300 audit(1707768217.317:1653): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91176370 a2=3 a3=0 items=0 ppid=1 pid=6300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:37.317000 audit[6300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc91176370 a2=3 a3=0 items=0 ppid=1 pid=6300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:37.317000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:37.392826 kernel: audit: type=1327 audit(1707768217.317:1653): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:37.392959 kernel: audit: type=1105 audit(1707768217.334:1654): pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.334000 audit[6300]: USER_START pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.336000 audit[6302]: CRED_ACQ pid=6302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.427899 kernel: audit: type=1103 audit(1707768217.336:1655): pid=6302 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.983816 sshd[6300]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:37.984000 audit[6300]: USER_END pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:37.987572 systemd[1]: sshd@19-10.200.8.17:22-10.200.12.6:54338.service: Deactivated successfully. Feb 12 20:03:37.988439 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:03:37.989863 systemd-logind[1316]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:03:37.990962 systemd-logind[1316]: Removed session 22. Feb 12 20:03:37.984000 audit[6300]: CRED_DISP pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.023315 kernel: audit: type=1106 audit(1707768217.984:1656): pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.023496 kernel: audit: type=1104 audit(1707768217.984:1657): pid=6300 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.023533 kernel: audit: type=1131 audit(1707768217.984:1658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.17:22-10.200.12.6:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:37.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.17:22-10.200.12.6:54338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:38.089107 systemd[1]: Started sshd@20-10.200.8.17:22-10.200.12.6:52480.service. Feb 12 20:03:38.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.17:22-10.200.12.6:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:38.719000 audit[6310]: USER_ACCT pid=6310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.720764 sshd[6310]: Accepted publickey for core from 10.200.12.6 port 52480 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:38.720000 audit[6310]: CRED_ACQ pid=6310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.720000 audit[6310]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0128270 a2=3 a3=0 items=0 ppid=1 pid=6310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:38.720000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:38.722199 sshd[6310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:38.727337 systemd[1]: Started session-23.scope. Feb 12 20:03:38.727969 systemd-logind[1316]: New session 23 of user core. Feb 12 20:03:38.731000 audit[6310]: USER_START pid=6310 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:38.733000 audit[6312]: CRED_ACQ pid=6312 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:39.228110 sshd[6310]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:39.228000 audit[6310]: USER_END pid=6310 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:39.228000 audit[6310]: CRED_DISP pid=6310 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:39.231645 systemd[1]: sshd@20-10.200.8.17:22-10.200.12.6:52480.service: Deactivated successfully. Feb 12 20:03:39.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.17:22-10.200.12.6:52480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:39.232785 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:03:39.233515 systemd-logind[1316]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:03:39.234474 systemd-logind[1316]: Removed session 23. Feb 12 20:03:42.816000 audit[6348]: NETFILTER_CFG table=filter:155 family=2 entries=18 op=nft_register_rule pid=6348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:42.822649 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 12 20:03:42.833335 kernel: audit: type=1325 audit(1707768222.816:1668): table=filter:155 family=2 entries=18 op=nft_register_rule pid=6348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:42.833406 kernel: audit: type=1300 audit(1707768222.816:1668): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff39ba0080 a2=0 a3=7fff39ba006c items=0 ppid=2681 pid=6348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:42.816000 audit[6348]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff39ba0080 a2=0 a3=7fff39ba006c items=0 ppid=2681 pid=6348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:42.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:42.863752 kernel: audit: type=1327 audit(1707768222.816:1668): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:42.863902 kernel: audit: type=1325 audit(1707768222.816:1669): table=nat:156 family=2 entries=178 op=nft_register_chain pid=6348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:42.816000 audit[6348]: NETFILTER_CFG table=nat:156 family=2 entries=178 op=nft_register_chain pid=6348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:03:42.876264 kernel: audit: type=1300 audit(1707768222.816:1669): arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7fff39ba0080 a2=0 a3=7fff39ba006c items=0 ppid=2681 pid=6348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:42.816000 audit[6348]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7fff39ba0080 a2=0 a3=7fff39ba006c items=0 ppid=2681 pid=6348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:42.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:42.907120 kernel: audit: type=1327 audit(1707768222.816:1669): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:03:44.333412 systemd[1]: Started sshd@21-10.200.8.17:22-10.200.12.6:52482.service. Feb 12 20:03:44.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.17:22-10.200.12.6:52482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:44.353323 kernel: audit: type=1130 audit(1707768224.332:1670): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.17:22-10.200.12.6:52482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:44.950000 audit[6351]: USER_ACCT pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:44.951526 sshd[6351]: Accepted publickey for core from 10.200.12.6 port 52482 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:44.969000 audit[6351]: CRED_ACQ pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:44.971470 sshd[6351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:44.977112 systemd[1]: Started session-24.scope. Feb 12 20:03:44.978308 systemd-logind[1316]: New session 24 of user core. Feb 12 20:03:44.989451 kernel: audit: type=1101 audit(1707768224.950:1671): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:44.989572 kernel: audit: type=1103 audit(1707768224.969:1672): pid=6351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:45.000375 kernel: audit: type=1006 audit(1707768224.969:1673): pid=6351 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 20:03:44.969000 audit[6351]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc513c3060 a2=3 a3=0 items=0 ppid=1 pid=6351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:44.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:44.982000 audit[6351]: USER_START pid=6351 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:44.987000 audit[6353]: CRED_ACQ pid=6353 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:45.490369 sshd[6351]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:45.490000 audit[6351]: USER_END pid=6351 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:45.491000 audit[6351]: CRED_DISP pid=6351 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:45.494033 systemd[1]: sshd@21-10.200.8.17:22-10.200.12.6:52482.service: Deactivated successfully. Feb 12 20:03:45.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.17:22-10.200.12.6:52482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:45.495301 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:03:45.496200 systemd-logind[1316]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:03:45.497320 systemd-logind[1316]: Removed session 24. Feb 12 20:03:49.557010 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.QCveuJ.mount: Deactivated successfully. Feb 12 20:03:50.606646 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:03:50.606762 kernel: audit: type=1130 audit(1707768230.595:1679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.17:22-10.200.12.6:41720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:50.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.17:22-10.200.12.6:41720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:50.596586 systemd[1]: Started sshd@22-10.200.8.17:22-10.200.12.6:41720.service. Feb 12 20:03:51.212000 audit[6390]: USER_ACCT pid=6390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.234356 kernel: audit: type=1101 audit(1707768231.212:1680): pid=6390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.234424 sshd[6390]: Accepted publickey for core from 10.200.12.6 port 41720 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:51.234869 sshd[6390]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:51.233000 audit[6390]: CRED_ACQ pid=6390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.240863 systemd[1]: Started session-25.scope. Feb 12 20:03:51.241992 systemd-logind[1316]: New session 25 of user core. Feb 12 20:03:51.252265 kernel: audit: type=1103 audit(1707768231.233:1681): pid=6390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.252337 kernel: audit: type=1006 audit(1707768231.233:1682): pid=6390 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 20:03:51.233000 audit[6390]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67abe020 a2=3 a3=0 items=0 ppid=1 pid=6390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:51.280279 kernel: audit: type=1300 audit(1707768231.233:1682): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff67abe020 a2=3 a3=0 items=0 ppid=1 pid=6390 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:51.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:51.246000 audit[6390]: USER_START pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.307191 kernel: audit: type=1327 audit(1707768231.233:1682): proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:51.307276 kernel: audit: type=1105 audit(1707768231.246:1683): pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.307308 kernel: audit: type=1103 audit(1707768231.248:1684): pid=6392 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.248000 audit[6392]: CRED_ACQ pid=6392 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.719398 sshd[6390]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:51.719000 audit[6390]: USER_END pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.722830 systemd[1]: sshd@22-10.200.8.17:22-10.200.12.6:41720.service: Deactivated successfully. Feb 12 20:03:51.723651 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 20:03:51.725365 systemd-logind[1316]: Session 25 logged out. Waiting for processes to exit. Feb 12 20:03:51.726268 systemd-logind[1316]: Removed session 25. Feb 12 20:03:51.719000 audit[6390]: CRED_DISP pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.741249 kernel: audit: type=1106 audit(1707768231.719:1685): pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.741300 kernel: audit: type=1104 audit(1707768231.719:1686): pid=6390 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:51.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.17:22-10.200.12.6:41720 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:56.809000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:56.815149 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:03:56.815289 kernel: audit: type=1400 audit(1707768236.809:1688): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:56.850427 kernel: audit: type=1400 audit(1707768236.810:1689): avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:56.810000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:56.840328 systemd[1]: Started sshd@23-10.200.8.17:22-10.200.12.6:41732.service. Feb 12 20:03:56.851773 kernel: audit: type=1300 audit(1707768236.810:1689): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0024f7590 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:56.810000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0024f7590 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:56.810000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:56.890980 kernel: audit: type=1327 audit(1707768236.810:1689): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:56.891145 kernel: audit: type=1300 audit(1707768236.809:1688): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f95100 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:56.809000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f95100 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:03:56.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:56.931573 kernel: audit: type=1327 audit(1707768236.809:1688): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:03:56.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.17:22-10.200.12.6:41732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:56.949250 kernel: audit: type=1130 audit(1707768236.835:1690): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.17:22-10.200.12.6:41732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:57.481508 kernel: audit: type=1101 audit(1707768237.460:1691): pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.460000 audit[6407]: USER_ACCT pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.463439 sshd[6407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:03:57.461000 audit[6407]: CRED_ACQ pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.482174 sshd[6407]: Accepted publickey for core from 10.200.12.6 port 41732 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:03:57.486933 systemd[1]: Started session-26.scope. Feb 12 20:03:57.488048 systemd-logind[1316]: New session 26 of user core. Feb 12 20:03:57.499245 kernel: audit: type=1103 audit(1707768237.461:1692): pid=6407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.499317 kernel: audit: type=1006 audit(1707768237.461:1693): pid=6407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 20:03:57.461000 audit[6407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff863d69d0 a2=3 a3=0 items=0 ppid=1 pid=6407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:03:57.461000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:03:57.492000 audit[6407]: USER_START pid=6407 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.493000 audit[6409]: CRED_ACQ pid=6409 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.601635 systemd[1]: run-containerd-runc-k8s.io-0ac78ec9b7d2493412f248aa1a292271c9b8d606b03cdda1e9f09e4c05838d1f-runc.DBFMDp.mount: Deactivated successfully. Feb 12 20:03:57.618172 systemd[1]: run-containerd-runc-k8s.io-d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d-runc.yjkXKe.mount: Deactivated successfully. Feb 12 20:03:57.907000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.907000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c005722240 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.907000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.928000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.928000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.928000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00321b520 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.928000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c005722780 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.931000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.931000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c005722960 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.931000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.934000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.934000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0034a4320 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.934000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.935000 audit[2316]: AVC avc: denied { watch } for pid=2316 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:03:57.935000 audit[2316]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c005722ab0 a2=fc6 a3=0 items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c59,c335 key=(null) Feb 12 20:03:57.935000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:03:57.960860 sshd[6407]: pam_unix(sshd:session): session closed for user core Feb 12 20:03:57.961000 audit[6407]: USER_END pid=6407 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.961000 audit[6407]: CRED_DISP pid=6407 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:03:57.964350 systemd[1]: sshd@23-10.200.8.17:22-10.200.12.6:41732.service: Deactivated successfully. Feb 12 20:03:57.965478 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 20:03:57.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.17:22-10.200.12.6:41732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:03:57.966382 systemd-logind[1316]: Session 26 logged out. Waiting for processes to exit. Feb 12 20:03:57.967424 systemd-logind[1316]: Removed session 26. Feb 12 20:04:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:01.126000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002f69ec0 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:01.126000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f95500 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:01.126000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:01.127000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:01.127000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f95520 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:01.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:01.128000 audit[2358]: AVC avc: denied { watch } for pid=2358 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:01.128000 audit[2358]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002f95640 a2=fc6 a3=0 items=0 ppid=2217 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:01.128000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:01.930679 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.kcda35.mount: Deactivated successfully. Feb 12 20:04:03.091069 kernel: kauditd_printk_skb: 37 callbacks suppressed Feb 12 20:04:03.091216 kernel: audit: type=1130 audit(1707768243.067:1709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.17:22-10.200.12.6:44454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:03.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.17:22-10.200.12.6:44454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:03.067740 systemd[1]: Started sshd@24-10.200.8.17:22-10.200.12.6:44454.service. Feb 12 20:04:03.686000 audit[6481]: USER_ACCT pid=6481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.704428 kernel: audit: type=1101 audit(1707768243.686:1710): pid=6481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.704504 sshd[6481]: Accepted publickey for core from 10.200.12.6 port 44454 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:04:03.704826 sshd[6481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:04:03.703000 audit[6481]: CRED_ACQ pid=6481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.710450 systemd[1]: Started session-27.scope. Feb 12 20:04:03.711278 systemd-logind[1316]: New session 27 of user core. Feb 12 20:04:03.723320 kernel: audit: type=1103 audit(1707768243.703:1711): pid=6481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.723420 kernel: audit: type=1006 audit(1707768243.704:1712): pid=6481 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 20:04:03.704000 audit[6481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc6957b20 a2=3 a3=0 items=0 ppid=1 pid=6481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:03.733254 kernel: audit: type=1300 audit(1707768243.704:1712): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc6957b20 a2=3 a3=0 items=0 ppid=1 pid=6481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:03.704000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:03.749317 kernel: audit: type=1327 audit(1707768243.704:1712): proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:03.754310 kernel: audit: type=1105 audit(1707768243.716:1713): pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.716000 audit[6481]: USER_START pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.773500 kernel: audit: type=1103 audit(1707768243.716:1714): pid=6483 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:03.716000 audit[6483]: CRED_ACQ pid=6483 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:04.192773 sshd[6481]: pam_unix(sshd:session): session closed for user core Feb 12 20:04:04.194000 audit[6481]: USER_END pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:04.196462 systemd[1]: sshd@24-10.200.8.17:22-10.200.12.6:44454.service: Deactivated successfully. Feb 12 20:04:04.197462 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 20:04:04.199763 systemd-logind[1316]: Session 27 logged out. Waiting for processes to exit. Feb 12 20:04:04.201005 systemd-logind[1316]: Removed session 27. Feb 12 20:04:04.194000 audit[6481]: CRED_DISP pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:04.214247 kernel: audit: type=1106 audit(1707768244.194:1715): pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:04.214296 kernel: audit: type=1104 audit(1707768244.194:1716): pid=6481 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:04.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.17:22-10.200.12.6:44454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:09.145199 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.8RDqcI.mount: Deactivated successfully. Feb 12 20:04:09.330073 systemd[1]: Started sshd@25-10.200.8.17:22-10.200.12.6:50668.service. Feb 12 20:04:09.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.17:22-10.200.12.6:50668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:09.335952 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:04:09.336033 kernel: audit: type=1130 audit(1707768249.330:1718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.17:22-10.200.12.6:50668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:09.949000 audit[6516]: USER_ACCT pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:09.970210 sshd[6516]: Accepted publickey for core from 10.200.12.6 port 50668 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:04:09.970587 kernel: audit: type=1101 audit(1707768249.949:1719): pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:09.970000 audit[6516]: CRED_ACQ pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:09.970932 sshd[6516]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:04:09.976208 systemd[1]: Started session-28.scope. Feb 12 20:04:09.977349 systemd-logind[1316]: New session 28 of user core. Feb 12 20:04:09.998218 kernel: audit: type=1103 audit(1707768249.970:1720): pid=6516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:09.998441 kernel: audit: type=1006 audit(1707768249.970:1721): pid=6516 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 20:04:09.998468 kernel: audit: type=1300 audit(1707768249.970:1721): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd85d32f0 a2=3 a3=0 items=0 ppid=1 pid=6516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:09.970000 audit[6516]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd85d32f0 a2=3 a3=0 items=0 ppid=1 pid=6516 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:10.018000 kernel: audit: type=1327 audit(1707768249.970:1721): proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:09.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:09.981000 audit[6516]: USER_START pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.040213 kernel: audit: type=1105 audit(1707768249.981:1722): pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.041605 kernel: audit: type=1103 audit(1707768249.984:1723): pid=6518 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:09.984000 audit[6518]: CRED_ACQ pid=6518 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.454241 sshd[6516]: pam_unix(sshd:session): session closed for user core Feb 12 20:04:10.455000 audit[6516]: USER_END pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.457656 systemd[1]: sshd@25-10.200.8.17:22-10.200.12.6:50668.service: Deactivated successfully. Feb 12 20:04:10.458620 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 20:04:10.459994 systemd-logind[1316]: Session 28 logged out. Waiting for processes to exit. Feb 12 20:04:10.460876 systemd-logind[1316]: Removed session 28. Feb 12 20:04:10.455000 audit[6516]: CRED_DISP pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.491120 kernel: audit: type=1106 audit(1707768250.455:1724): pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.491254 kernel: audit: type=1104 audit(1707768250.455:1725): pid=6516 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:10.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.17:22-10.200.12.6:50668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:15.557596 systemd[1]: Started sshd@26-10.200.8.17:22-10.200.12.6:50678.service. Feb 12 20:04:15.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.17:22-10.200.12.6:50678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:15.563425 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:04:15.563506 kernel: audit: type=1130 audit(1707768255.558:1727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.17:22-10.200.12.6:50678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:16.190572 kernel: audit: type=1101 audit(1707768256.171:1728): pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.171000 audit[6529]: USER_ACCT pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.190844 sshd[6529]: Accepted publickey for core from 10.200.12.6 port 50678 ssh2: RSA SHA256:O9yTG6PKtgxWL/0m3BGiwi35nSo8w6cK1RNins02K7A Feb 12 20:04:16.190712 sshd[6529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:04:16.189000 audit[6529]: CRED_ACQ pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.196787 systemd-logind[1316]: New session 29 of user core. Feb 12 20:04:16.197432 systemd[1]: Started session-29.scope. Feb 12 20:04:16.219285 kernel: audit: type=1103 audit(1707768256.189:1729): pid=6529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.219427 kernel: audit: type=1006 audit(1707768256.189:1730): pid=6529 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 12 20:04:16.219460 kernel: audit: type=1300 audit(1707768256.189:1730): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12ceb530 a2=3 a3=0 items=0 ppid=1 pid=6529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:16.189000 audit[6529]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc12ceb530 a2=3 a3=0 items=0 ppid=1 pid=6529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:16.237427 kernel: audit: type=1327 audit(1707768256.189:1730): proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:16.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:04:16.203000 audit[6529]: USER_START pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.244263 kernel: audit: type=1105 audit(1707768256.203:1731): pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.204000 audit[6531]: CRED_ACQ pid=6531 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.263257 kernel: audit: type=1103 audit(1707768256.204:1732): pid=6531 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.667196 sshd[6529]: pam_unix(sshd:session): session closed for user core Feb 12 20:04:16.668000 audit[6529]: USER_END pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.671096 systemd-logind[1316]: Session 29 logged out. Waiting for processes to exit. Feb 12 20:04:16.672811 systemd[1]: sshd@26-10.200.8.17:22-10.200.12.6:50678.service: Deactivated successfully. Feb 12 20:04:16.673757 systemd[1]: session-29.scope: Deactivated successfully. Feb 12 20:04:16.675813 systemd-logind[1316]: Removed session 29. Feb 12 20:04:16.668000 audit[6529]: CRED_DISP pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.703867 kernel: audit: type=1106 audit(1707768256.668:1733): pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.704058 kernel: audit: type=1104 audit(1707768256.668:1734): pid=6529 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 20:04:16.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.8.17:22-10.200.12.6:50678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:04:19.555993 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.E5c0ly.mount: Deactivated successfully. Feb 12 20:04:27.622402 systemd[1]: run-containerd-runc-k8s.io-d69d7d937aaf3b27ea7ef52a48b4b1283e1abc902063164fe268525790fda77d-runc.iSWD21.mount: Deactivated successfully. Feb 12 20:04:30.573527 systemd[1]: cri-containerd-ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac.scope: Deactivated successfully. Feb 12 20:04:30.572000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:04:30.573859 systemd[1]: cri-containerd-ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac.scope: Consumed 5.891s CPU time. Feb 12 20:04:30.579740 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:04:30.579844 kernel: audit: type=1334 audit(1707768270.572:1736): prog-id=124 op=UNLOAD Feb 12 20:04:30.579000 audit: BPF prog-id=127 op=UNLOAD Feb 12 20:04:30.592300 kernel: audit: type=1334 audit(1707768270.579:1737): prog-id=127 op=UNLOAD Feb 12 20:04:30.602998 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac-rootfs.mount: Deactivated successfully. Feb 12 20:04:30.605557 env[1331]: time="2024-02-12T20:04:30.605506551Z" level=info msg="shim disconnected" id=ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac Feb 12 20:04:30.606122 env[1331]: time="2024-02-12T20:04:30.606061856Z" level=warning msg="cleaning up after shim disconnected" id=ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac namespace=k8s.io Feb 12 20:04:30.606262 env[1331]: time="2024-02-12T20:04:30.606244857Z" level=info msg="cleaning up dead shim" Feb 12 20:04:30.613809 env[1331]: time="2024-02-12T20:04:30.613781622Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:04:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6627 runtime=io.containerd.runc.v2\n" Feb 12 20:04:30.722301 kubelet[2485]: I0212 20:04:30.722061 2485 scope.go:115] "RemoveContainer" containerID="ecba68a09a7a64875a91e837637814405c4144af9b696257ab82d01f809842ac" Feb 12 20:04:30.724654 env[1331]: time="2024-02-12T20:04:30.724574371Z" level=info msg="CreateContainer within sandbox \"c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 20:04:30.780767 env[1331]: time="2024-02-12T20:04:30.780719452Z" level=info msg="CreateContainer within sandbox \"c1982fb53eb923c86b2690c007f9aa9aa8f5cbd7e8890913dc77ea1bab830d95\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"4ca87a39345e3877e1a134f62a1ca980075045ded9bb02dc2612c895c0ccb64b\"" Feb 12 20:04:30.781301 env[1331]: time="2024-02-12T20:04:30.781260957Z" level=info msg="StartContainer for \"4ca87a39345e3877e1a134f62a1ca980075045ded9bb02dc2612c895c0ccb64b\"" Feb 12 20:04:30.800717 systemd[1]: Started cri-containerd-4ca87a39345e3877e1a134f62a1ca980075045ded9bb02dc2612c895c0ccb64b.scope. Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.846467 kernel: audit: type=1400 audit(1707768270.817:1738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.846574 kernel: audit: type=1400 audit(1707768270.817:1739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.860583 kernel: audit: type=1400 audit(1707768270.817:1740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.860658 kernel: audit: type=1400 audit(1707768270.817:1741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.887938 kernel: audit: type=1400 audit(1707768270.817:1742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.891256 kernel: audit: type=1400 audit(1707768270.817:1743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.917299 kernel: audit: type=1400 audit(1707768270.817:1744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.917349 kernel: audit: type=1400 audit(1707768270.817:1745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.846000 audit: BPF prog-id=218 op=LOAD Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.851000 audit: BPF prog-id=219 op=LOAD Feb 12 20:04:30.851000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000225290 items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit: BPF prog-id=220 op=LOAD Feb 12 20:04:30.873000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002252d8 items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.873000 audit: BPF prog-id=220 op=UNLOAD Feb 12 20:04:30.873000 audit: BPF prog-id=219 op=UNLOAD Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000145c30 a2=78 a3=c0002256e8 items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { perfmon } for pid=6647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit[6647]: AVC avc: denied { bpf } for pid=6647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:30.873000 audit: BPF prog-id=221 op=LOAD Feb 12 20:04:30.873000 audit[6647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002256e8 items=0 ppid=2590 pid=6647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:30.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463613837613339333435653338373765316131333466363261316361 Feb 12 20:04:30.955218 env[1331]: time="2024-02-12T20:04:30.955162547Z" level=info msg="StartContainer for \"4ca87a39345e3877e1a134f62a1ca980075045ded9bb02dc2612c895c0ccb64b\" returns successfully" Feb 12 20:04:31.922807 systemd[1]: run-containerd-runc-k8s.io-9b91d622583646af2dde4855c77f41f6241a611f0ae5d70ca1581ee7dbba60a0-runc.6wy4mA.mount: Deactivated successfully. Feb 12 20:04:32.078944 systemd[1]: cri-containerd-28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362.scope: Deactivated successfully. Feb 12 20:04:32.079344 systemd[1]: cri-containerd-28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362.scope: Consumed 3.906s CPU time. Feb 12 20:04:32.081000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:04:32.081000 audit: BPF prog-id=101 op=UNLOAD Feb 12 20:04:32.116694 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362-rootfs.mount: Deactivated successfully. Feb 12 20:04:32.117905 env[1331]: time="2024-02-12T20:04:32.117857975Z" level=info msg="shim disconnected" id=28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362 Feb 12 20:04:32.118311 env[1331]: time="2024-02-12T20:04:32.117907476Z" level=warning msg="cleaning up after shim disconnected" id=28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362 namespace=k8s.io Feb 12 20:04:32.118311 env[1331]: time="2024-02-12T20:04:32.117918876Z" level=info msg="cleaning up dead shim" Feb 12 20:04:32.126097 env[1331]: time="2024-02-12T20:04:32.126056745Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:04:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6706 runtime=io.containerd.runc.v2\n" Feb 12 20:04:32.730540 kubelet[2485]: I0212 20:04:32.730506 2485 scope.go:115] "RemoveContainer" containerID="28c56243c376dc08e09c1dd2a1fb71a3f40bdc0f994301995ff323e281def362" Feb 12 20:04:32.733031 env[1331]: time="2024-02-12T20:04:32.732988413Z" level=info msg="CreateContainer within sandbox \"3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 20:04:32.775092 env[1331]: time="2024-02-12T20:04:32.775041171Z" level=info msg="CreateContainer within sandbox \"3de78761b017cf64b7fcd1cd447f4120e93df580330129f9e7768bc13432e9de\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"8963461afa89e3ccc24b8eaf680ab9cdb7b1cf041bde84f00256d02e59ad7104\"" Feb 12 20:04:32.775624 env[1331]: time="2024-02-12T20:04:32.775584275Z" level=info msg="StartContainer for \"8963461afa89e3ccc24b8eaf680ab9cdb7b1cf041bde84f00256d02e59ad7104\"" Feb 12 20:04:32.803772 systemd[1]: Started cri-containerd-8963461afa89e3ccc24b8eaf680ab9cdb7b1cf041bde84f00256d02e59ad7104.scope. Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.818000 audit: BPF prog-id=222 op=LOAD Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2217 pid=6727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:32.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363334363161666138396533636363323462386561663638306162 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2217 pid=6727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:32.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363334363161666138396533636363323462386561663638306162 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit: BPF prog-id=223 op=LOAD Feb 12 20:04:32.819000 audit[6727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212520 items=0 ppid=2217 pid=6727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:32.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363334363161666138396533636363323462386561663638306162 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit: BPF prog-id=224 op=LOAD Feb 12 20:04:32.819000 audit[6727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212568 items=0 ppid=2217 pid=6727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:32.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363334363161666138396533636363323462386561663638306162 Feb 12 20:04:32.819000 audit: BPF prog-id=224 op=UNLOAD Feb 12 20:04:32.819000 audit: BPF prog-id=223 op=UNLOAD Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { perfmon } for pid=6727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit[6727]: AVC avc: denied { bpf } for pid=6727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:32.819000 audit: BPF prog-id=225 op=LOAD Feb 12 20:04:32.819000 audit[6727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000212978 items=0 ppid=2217 pid=6727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:32.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839363334363161666138396533636363323462386561663638306162 Feb 12 20:04:32.860666 env[1331]: time="2024-02-12T20:04:32.860613799Z" level=info msg="StartContainer for \"8963461afa89e3ccc24b8eaf680ab9cdb7b1cf041bde84f00256d02e59ad7104\" returns successfully" Feb 12 20:04:33.476000 audit[6738]: AVC avc: denied { watch } for pid=6738 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:33.476000 audit[6738]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000015020 a2=fc6 a3=0 items=0 ppid=2217 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:33.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:33.477000 audit[6738]: AVC avc: denied { watch } for pid=6738 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:04:33.477000 audit[6738]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002c8300 a2=fc6 a3=0 items=0 ppid=2217 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c835,c974 key=(null) Feb 12 20:04:33.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:04:33.759352 systemd[1]: run-containerd-runc-k8s.io-8963461afa89e3ccc24b8eaf680ab9cdb7b1cf041bde84f00256d02e59ad7104-runc.3ecv3r.mount: Deactivated successfully. Feb 12 20:04:33.800864 kubelet[2485]: E0212 20:04:33.800812 2485 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:58778->10.200.8.13:2379: read: connection timed out Feb 12 20:04:33.804076 systemd[1]: cri-containerd-a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5.scope: Deactivated successfully. Feb 12 20:04:33.804420 systemd[1]: cri-containerd-a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5.scope: Consumed 1.920s CPU time. Feb 12 20:04:33.809000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:04:33.809000 audit: BPF prog-id=109 op=UNLOAD Feb 12 20:04:33.836802 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5-rootfs.mount: Deactivated successfully. Feb 12 20:04:33.838136 env[1331]: time="2024-02-12T20:04:33.838085001Z" level=info msg="shim disconnected" id=a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5 Feb 12 20:04:33.838552 env[1331]: time="2024-02-12T20:04:33.838137001Z" level=warning msg="cleaning up after shim disconnected" id=a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5 namespace=k8s.io Feb 12 20:04:33.838552 env[1331]: time="2024-02-12T20:04:33.838149301Z" level=info msg="cleaning up dead shim" Feb 12 20:04:33.845990 env[1331]: time="2024-02-12T20:04:33.845954767Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:04:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6765 runtime=io.containerd.runc.v2\n" Feb 12 20:04:34.738576 kubelet[2485]: I0212 20:04:34.738543 2485 scope.go:115] "RemoveContainer" containerID="a4641430838ee76b121b9f494fffe3f6a22ac84ac0e9b1adb4900ed96d24a2a5" Feb 12 20:04:34.740677 env[1331]: time="2024-02-12T20:04:34.740633543Z" level=info msg="CreateContainer within sandbox \"c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 20:04:34.794696 env[1331]: time="2024-02-12T20:04:34.794644800Z" level=info msg="CreateContainer within sandbox \"c0f4c1915ea86aec682e40ca00b21c294e536668e9211a4b04625572cc5f4cff\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"775c812e1b9431e6c3366d61e10804f53314af2c273523345f6dcfa194d95072\"" Feb 12 20:04:34.795252 env[1331]: time="2024-02-12T20:04:34.795197105Z" level=info msg="StartContainer for \"775c812e1b9431e6c3366d61e10804f53314af2c273523345f6dcfa194d95072\"" Feb 12 20:04:34.823924 systemd[1]: Started cri-containerd-775c812e1b9431e6c3366d61e10804f53314af2c273523345f6dcfa194d95072.scope. Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit: BPF prog-id=226 op=LOAD Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2183 pid=6787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356338313265316239343331653663333336366436316531303830 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2183 pid=6787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356338313265316239343331653663333336366436316531303830 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit: BPF prog-id=227 op=LOAD Feb 12 20:04:34.835000 audit[6787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000267d70 items=0 ppid=2183 pid=6787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356338313265316239343331653663333336366436316531303830 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.835000 audit: BPF prog-id=228 op=LOAD Feb 12 20:04:34.835000 audit[6787]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000267db8 items=0 ppid=2183 pid=6787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:34.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356338313265316239343331653663333336366436316531303830 Feb 12 20:04:34.836000 audit: BPF prog-id=228 op=UNLOAD Feb 12 20:04:34.836000 audit: BPF prog-id=227 op=UNLOAD Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { perfmon } for pid=6787 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit[6787]: AVC avc: denied { bpf } for pid=6787 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:04:34.836000 audit: BPF prog-id=229 op=LOAD Feb 12 20:04:34.836000 audit[6787]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e01c8 items=0 ppid=2183 pid=6787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:04:34.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737356338313265316239343331653663333336366436316531303830 Feb 12 20:04:34.880435 env[1331]: time="2024-02-12T20:04:34.880375326Z" level=info msg="StartContainer for \"775c812e1b9431e6c3366d61e10804f53314af2c273523345f6dcfa194d95072\" returns successfully" Feb 12 20:04:34.999000 audit[5297]: AVC avc: denied { watch } for pid=5297 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.3562585575/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c102,c849 tclass=file permissive=0 Feb 12 20:04:34.999000 audit[5297]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009ac620 a2=fc6 a3=0 items=0 ppid=5169 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c102,c849 key=(null) Feb 12 20:04:34.999000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:04:35.334387 kubelet[2485]: E0212 20:04:35.334269 2485 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-996941d352.17b3363053cba21a", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-996941d352", UID:"e193df86b7261621d27e628d2da0ce16", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-996941d352"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 4, 24, 895734298, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 4, 24, 895734298, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.17:58572->10.200.8.13:2379: read: connection timed out' (will not retry!) Feb 12 20:04:35.690000 audit[5345]: AVC avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:04:35.695363 kernel: kauditd_printk_skb: 187 callbacks suppressed Feb 12 20:04:35.695493 kernel: audit: type=1400 audit(1707768275.690:1800): avc: denied { watch } for pid=5345 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_01_27.20419753/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c578,c655 tclass=file permissive=0 Feb 12 20:04:35.690000 audit[5345]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001dc1920 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:04:35.734373 kernel: audit: type=1300 audit(1707768275.690:1800): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001dc1920 a2=fc6 a3=0 items=0 ppid=5129 pid=5345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c655 key=(null) Feb 12 20:04:35.734525 kernel: audit: type=1327 audit(1707768275.690:1800): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:04:35.690000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:04:43.802158 kubelet[2485]: E0212 20:04:43.801966 2485 controller.go:189] failed to update lease, error: Put "https://10.200.8.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-996941d352?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 20:04:49.562814 systemd[1]: run-containerd-runc-k8s.io-8488568c74a681879dcf41da1bac728e15f489a5a1a6fa8a12fa9dbeadae84ee-runc.iYQcnn.mount: Deactivated successfully.