Feb 9 09:56:37.077542 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 09:56:37.077563 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 09:56:37.077571 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 09:56:37.077578 kernel: printk: bootconsole [pl11] enabled Feb 9 09:56:37.083178 kernel: efi: EFI v2.70 by EDK II Feb 9 09:56:37.083195 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3e198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 09:56:37.083202 kernel: random: crng init done Feb 9 09:56:37.083209 kernel: ACPI: Early table checksum verification disabled Feb 9 09:56:37.083215 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 09:56:37.083222 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083228 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083240 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 09:56:37.083246 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083252 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083260 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083266 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083272 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083280 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083287 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 09:56:37.083293 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:56:37.083299 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 09:56:37.083305 kernel: NUMA: Failed to initialise from firmware Feb 9 09:56:37.083312 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:56:37.083318 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 9 09:56:37.083324 kernel: Zone ranges: Feb 9 09:56:37.083330 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 09:56:37.083336 kernel: DMA32 empty Feb 9 09:56:37.083344 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:56:37.083350 kernel: Movable zone start for each node Feb 9 09:56:37.083356 kernel: Early memory node ranges Feb 9 09:56:37.083362 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 09:56:37.083368 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 09:56:37.083375 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 09:56:37.083381 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 09:56:37.083387 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 09:56:37.083393 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 09:56:37.083399 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 09:56:37.083405 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 09:56:37.083411 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:56:37.083419 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:56:37.083428 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 09:56:37.083435 kernel: psci: probing for conduit method from ACPI. Feb 9 09:56:37.083442 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 09:56:37.083448 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 09:56:37.083456 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 09:56:37.083462 kernel: psci: SMC Calling Convention v1.4 Feb 9 09:56:37.083469 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 09:56:37.083475 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 09:56:37.083482 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 09:56:37.083489 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 09:56:37.083496 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 09:56:37.083502 kernel: Detected PIPT I-cache on CPU0 Feb 9 09:56:37.083509 kernel: CPU features: detected: GIC system register CPU interface Feb 9 09:56:37.083515 kernel: CPU features: detected: Hardware dirty bit management Feb 9 09:56:37.083522 kernel: CPU features: detected: Spectre-BHB Feb 9 09:56:37.083528 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 09:56:37.083537 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 09:56:37.083543 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 09:56:37.083550 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 09:56:37.083557 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 09:56:37.083563 kernel: Policy zone: Normal Feb 9 09:56:37.083571 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:56:37.083579 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:56:37.083585 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 09:56:37.083592 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:56:37.083598 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:56:37.083606 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 09:56:37.083613 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 9 09:56:37.083620 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:56:37.083627 kernel: trace event string verifier disabled Feb 9 09:56:37.083633 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 09:56:37.083640 kernel: rcu: RCU event tracing is enabled. Feb 9 09:56:37.083647 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:56:37.083654 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 09:56:37.083660 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:56:37.083667 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:56:37.083673 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:56:37.083681 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 09:56:37.083687 kernel: GICv3: 960 SPIs implemented Feb 9 09:56:37.083694 kernel: GICv3: 0 Extended SPIs implemented Feb 9 09:56:37.083700 kernel: GICv3: Distributor has no Range Selector support Feb 9 09:56:37.083707 kernel: Root IRQ handler: gic_handle_irq Feb 9 09:56:37.083713 kernel: GICv3: 16 PPIs implemented Feb 9 09:56:37.083720 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 09:56:37.083726 kernel: ITS: No ITS available, not enabling LPIs Feb 9 09:56:37.083733 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:56:37.083740 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 09:56:37.083747 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 09:56:37.083753 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 09:56:37.083762 kernel: Console: colour dummy device 80x25 Feb 9 09:56:37.083769 kernel: printk: console [tty1] enabled Feb 9 09:56:37.083776 kernel: ACPI: Core revision 20210730 Feb 9 09:56:37.083784 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 09:56:37.083790 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:56:37.083797 kernel: LSM: Security Framework initializing Feb 9 09:56:37.083804 kernel: SELinux: Initializing. Feb 9 09:56:37.083811 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:56:37.083818 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:56:37.083827 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 09:56:37.083834 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 09:56:37.083841 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:56:37.083848 kernel: Remapping and enabling EFI services. Feb 9 09:56:37.083855 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:56:37.083862 kernel: Detected PIPT I-cache on CPU1 Feb 9 09:56:37.083870 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 09:56:37.083877 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:56:37.083883 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 09:56:37.083891 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:56:37.083898 kernel: SMP: Total of 2 processors activated. Feb 9 09:56:37.083905 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 09:56:37.083912 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 09:56:37.083919 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 09:56:37.083926 kernel: CPU features: detected: CRC32 instructions Feb 9 09:56:37.083933 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 09:56:37.083940 kernel: CPU features: detected: LSE atomic instructions Feb 9 09:56:37.083947 kernel: CPU features: detected: Privileged Access Never Feb 9 09:56:37.083955 kernel: CPU: All CPU(s) started at EL1 Feb 9 09:56:37.083962 kernel: alternatives: patching kernel code Feb 9 09:56:37.083973 kernel: devtmpfs: initialized Feb 9 09:56:37.083982 kernel: KASLR enabled Feb 9 09:56:37.083989 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:56:37.083996 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:56:37.084003 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:56:37.084010 kernel: SMBIOS 3.1.0 present. Feb 9 09:56:37.084018 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 09:56:37.084025 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:56:37.084034 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 09:56:37.084041 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 09:56:37.084048 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 09:56:37.084055 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:56:37.084063 kernel: audit: type=2000 audit(0.090:1): state=initialized audit_enabled=0 res=1 Feb 9 09:56:37.084070 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:56:37.084077 kernel: cpuidle: using governor menu Feb 9 09:56:37.084085 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 09:56:37.084092 kernel: ASID allocator initialised with 32768 entries Feb 9 09:56:37.084099 kernel: ACPI: bus type PCI registered Feb 9 09:56:37.084107 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:56:37.084114 kernel: Serial: AMBA PL011 UART driver Feb 9 09:56:37.084121 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:56:37.084148 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 09:56:37.084156 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:56:37.084163 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 09:56:37.084172 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:56:37.084180 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 09:56:37.084187 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:56:37.084195 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:56:37.084202 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:56:37.084209 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:56:37.084216 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:56:37.084223 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:56:37.084231 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:56:37.084239 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:56:37.084246 kernel: ACPI: Interpreter enabled Feb 9 09:56:37.084253 kernel: ACPI: Using GIC for interrupt routing Feb 9 09:56:37.084261 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 09:56:37.084268 kernel: printk: console [ttyAMA0] enabled Feb 9 09:56:37.084275 kernel: printk: bootconsole [pl11] disabled Feb 9 09:56:37.084282 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 09:56:37.084289 kernel: iommu: Default domain type: Translated Feb 9 09:56:37.084297 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 09:56:37.084305 kernel: vgaarb: loaded Feb 9 09:56:37.084313 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:56:37.084320 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:56:37.084327 kernel: PTP clock support registered Feb 9 09:56:37.084334 kernel: Registered efivars operations Feb 9 09:56:37.084341 kernel: No ACPI PMU IRQ for CPU0 Feb 9 09:56:37.084356 kernel: No ACPI PMU IRQ for CPU1 Feb 9 09:56:37.084363 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 09:56:37.084370 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:56:37.084379 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:56:37.084386 kernel: pnp: PnP ACPI init Feb 9 09:56:37.084393 kernel: pnp: PnP ACPI: found 0 devices Feb 9 09:56:37.084400 kernel: NET: Registered PF_INET protocol family Feb 9 09:56:37.084407 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:56:37.084414 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 09:56:37.084421 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:56:37.084428 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:56:37.084436 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 09:56:37.084444 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 09:56:37.084452 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:56:37.084459 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:56:37.084466 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:56:37.084473 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:56:37.084480 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 09:56:37.084488 kernel: kvm [1]: HYP mode not available Feb 9 09:56:37.084495 kernel: Initialise system trusted keyrings Feb 9 09:56:37.084502 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 09:56:37.084511 kernel: Key type asymmetric registered Feb 9 09:56:37.084518 kernel: Asymmetric key parser 'x509' registered Feb 9 09:56:37.084525 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:56:37.084532 kernel: io scheduler mq-deadline registered Feb 9 09:56:37.084540 kernel: io scheduler kyber registered Feb 9 09:56:37.084547 kernel: io scheduler bfq registered Feb 9 09:56:37.084554 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:56:37.084561 kernel: thunder_xcv, ver 1.0 Feb 9 09:56:37.084568 kernel: thunder_bgx, ver 1.0 Feb 9 09:56:37.084576 kernel: nicpf, ver 1.0 Feb 9 09:56:37.084583 kernel: nicvf, ver 1.0 Feb 9 09:56:37.084733 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 09:56:37.084797 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T09:56:36 UTC (1707472596) Feb 9 09:56:37.084806 kernel: efifb: probing for efifb Feb 9 09:56:37.084813 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 09:56:37.084820 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 09:56:37.084828 kernel: efifb: scrolling: redraw Feb 9 09:56:37.084837 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 09:56:37.084844 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:56:37.084851 kernel: fb0: EFI VGA frame buffer device Feb 9 09:56:37.084858 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 09:56:37.084865 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:56:37.084873 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:56:37.084880 kernel: Segment Routing with IPv6 Feb 9 09:56:37.084887 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:56:37.084894 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:56:37.084903 kernel: Key type dns_resolver registered Feb 9 09:56:37.084910 kernel: registered taskstats version 1 Feb 9 09:56:37.084917 kernel: Loading compiled-in X.509 certificates Feb 9 09:56:37.084924 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 09:56:37.084932 kernel: Key type .fscrypt registered Feb 9 09:56:37.084939 kernel: Key type fscrypt-provisioning registered Feb 9 09:56:37.084946 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:56:37.084953 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:56:37.084960 kernel: ima: No architecture policies found Feb 9 09:56:37.084969 kernel: Freeing unused kernel memory: 34688K Feb 9 09:56:37.084976 kernel: Run /init as init process Feb 9 09:56:37.084983 kernel: with arguments: Feb 9 09:56:37.084990 kernel: /init Feb 9 09:56:37.084997 kernel: with environment: Feb 9 09:56:37.085004 kernel: HOME=/ Feb 9 09:56:37.085011 kernel: TERM=linux Feb 9 09:56:37.085018 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:56:37.085027 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:56:37.085038 systemd[1]: Detected virtualization microsoft. Feb 9 09:56:37.085045 systemd[1]: Detected architecture arm64. Feb 9 09:56:37.085053 systemd[1]: Running in initrd. Feb 9 09:56:37.085060 systemd[1]: No hostname configured, using default hostname. Feb 9 09:56:37.085068 systemd[1]: Hostname set to . Feb 9 09:56:37.085076 systemd[1]: Initializing machine ID from random generator. Feb 9 09:56:37.085083 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:56:37.085092 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:56:37.085099 systemd[1]: Reached target cryptsetup.target. Feb 9 09:56:37.085107 systemd[1]: Reached target paths.target. Feb 9 09:56:37.085114 systemd[1]: Reached target slices.target. Feb 9 09:56:37.085133 systemd[1]: Reached target swap.target. Feb 9 09:56:37.085143 systemd[1]: Reached target timers.target. Feb 9 09:56:37.085151 systemd[1]: Listening on iscsid.socket. Feb 9 09:56:37.085158 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:56:37.085168 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:56:37.085175 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:56:37.085183 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:56:37.085190 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:56:37.085198 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:56:37.085206 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:56:37.085213 systemd[1]: Reached target sockets.target. Feb 9 09:56:37.085221 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:56:37.085228 systemd[1]: Finished network-cleanup.service. Feb 9 09:56:37.085237 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:56:37.085245 systemd[1]: Starting systemd-journald.service... Feb 9 09:56:37.085252 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:56:37.085260 systemd[1]: Starting systemd-resolved.service... Feb 9 09:56:37.085273 systemd-journald[276]: Journal started Feb 9 09:56:37.085319 systemd-journald[276]: Runtime Journal (/run/log/journal/6f53c5ed86eb48ffa61e121d8d664879) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:56:37.077655 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 09:56:37.114144 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:56:37.114186 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:56:37.119520 kernel: Bridge firewalling registered Feb 9 09:56:37.119650 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 09:56:37.139145 kernel: SCSI subsystem initialized Feb 9 09:56:37.161015 systemd[1]: Started systemd-journald.service. Feb 9 09:56:37.161074 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:56:37.161087 kernel: audit: type=1130 audit(1707472597.160:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.153273 systemd-resolved[278]: Positive Trust Anchors: Feb 9 09:56:37.189535 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:56:37.153282 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:56:37.232603 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:56:37.232629 kernel: audit: type=1130 audit(1707472597.194:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.153310 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:56:37.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.155482 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 09:56:37.180361 systemd[1]: Started systemd-resolved.service. Feb 9 09:56:37.221457 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:56:37.231912 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 09:56:37.371161 kernel: audit: type=1130 audit(1707472597.237:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.371191 kernel: audit: type=1130 audit(1707472597.303:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.371200 kernel: audit: type=1130 audit(1707472597.314:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.293295 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:56:37.303725 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:56:37.412602 kernel: audit: type=1130 audit(1707472597.341:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.314406 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:56:37.341883 systemd[1]: Reached target nss-lookup.target. Feb 9 09:56:37.377201 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:56:37.406553 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:56:37.435421 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:56:37.448965 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:56:37.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.460086 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:56:37.495904 kernel: audit: type=1130 audit(1707472597.459:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.491294 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:56:37.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.522014 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:56:37.557165 kernel: audit: type=1130 audit(1707472597.490:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.557198 kernel: audit: type=1130 audit(1707472597.520:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.562971 dracut-cmdline[298]: dracut-dracut-053 Feb 9 09:56:37.569562 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:56:37.637157 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:56:37.650150 kernel: iscsi: registered transport (tcp) Feb 9 09:56:37.672500 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:56:37.672560 kernel: QLogic iSCSI HBA Driver Feb 9 09:56:37.710711 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:56:37.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:37.717572 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:56:37.776146 kernel: raid6: neonx8 gen() 13817 MB/s Feb 9 09:56:37.797145 kernel: raid6: neonx8 xor() 10825 MB/s Feb 9 09:56:37.818145 kernel: raid6: neonx4 gen() 13568 MB/s Feb 9 09:56:37.840137 kernel: raid6: neonx4 xor() 11294 MB/s Feb 9 09:56:37.861147 kernel: raid6: neonx2 gen() 12958 MB/s Feb 9 09:56:37.882145 kernel: raid6: neonx2 xor() 10259 MB/s Feb 9 09:56:37.904142 kernel: raid6: neonx1 gen() 10489 MB/s Feb 9 09:56:37.925138 kernel: raid6: neonx1 xor() 8800 MB/s Feb 9 09:56:37.946156 kernel: raid6: int64x8 gen() 6297 MB/s Feb 9 09:56:37.968136 kernel: raid6: int64x8 xor() 3545 MB/s Feb 9 09:56:37.989142 kernel: raid6: int64x4 gen() 7255 MB/s Feb 9 09:56:38.010142 kernel: raid6: int64x4 xor() 3852 MB/s Feb 9 09:56:38.032147 kernel: raid6: int64x2 gen() 6136 MB/s Feb 9 09:56:38.053137 kernel: raid6: int64x2 xor() 3321 MB/s Feb 9 09:56:38.074138 kernel: raid6: int64x1 gen() 5046 MB/s Feb 9 09:56:38.101300 kernel: raid6: int64x1 xor() 2643 MB/s Feb 9 09:56:38.101340 kernel: raid6: using algorithm neonx8 gen() 13817 MB/s Feb 9 09:56:38.101349 kernel: raid6: .... xor() 10825 MB/s, rmw enabled Feb 9 09:56:38.107037 kernel: raid6: using neon recovery algorithm Feb 9 09:56:38.126142 kernel: xor: measuring software checksum speed Feb 9 09:56:38.126174 kernel: 8regs : 17279 MB/sec Feb 9 09:56:38.135503 kernel: 32regs : 20765 MB/sec Feb 9 09:56:38.140290 kernel: arm64_neon : 27920 MB/sec Feb 9 09:56:38.140302 kernel: xor: using function: arm64_neon (27920 MB/sec) Feb 9 09:56:38.205144 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 09:56:38.216899 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:56:38.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:38.227000 audit: BPF prog-id=7 op=LOAD Feb 9 09:56:38.227000 audit: BPF prog-id=8 op=LOAD Feb 9 09:56:38.228492 systemd[1]: Starting systemd-udevd.service... Feb 9 09:56:38.245478 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 09:56:38.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:38.252761 systemd[1]: Started systemd-udevd.service. Feb 9 09:56:38.264798 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:56:38.283651 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 09:56:38.315151 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:56:38.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:38.321998 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:56:38.358770 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:56:38.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:38.414147 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 09:56:38.438629 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 09:56:38.438679 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 09:56:38.438689 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 09:56:38.444146 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 09:56:38.444199 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 9 09:56:38.457142 kernel: scsi host0: storvsc_host_t Feb 9 09:56:38.471161 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 09:56:38.471341 kernel: scsi host1: storvsc_host_t Feb 9 09:56:38.476146 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 09:56:38.486707 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 09:56:38.501351 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 9 09:56:38.525468 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 09:56:38.525743 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 09:56:38.533736 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 09:56:38.533928 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 09:56:38.534025 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 09:56:38.542726 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 09:56:38.542963 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 09:56:38.543049 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 09:56:38.557152 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:56:38.562153 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 09:56:38.587148 kernel: hv_netvsc 000d3ac5-1365-000d-3ac5-1365000d3ac5 eth0: VF slot 1 added Feb 9 09:56:38.605093 kernel: hv_vmbus: registering driver hv_pci Feb 9 09:56:38.605159 kernel: hv_pci aca52b03-f391-4ff7-9685-6310394bb828: PCI VMBus probing: Using version 0x10004 Feb 9 09:56:38.627456 kernel: hv_pci aca52b03-f391-4ff7-9685-6310394bb828: PCI host bridge to bus f391:00 Feb 9 09:56:38.627658 kernel: pci_bus f391:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 09:56:38.627764 kernel: pci_bus f391:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 09:56:38.643247 kernel: pci f391:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 09:56:38.656152 kernel: pci f391:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:56:38.676867 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:56:38.720771 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (529) Feb 9 09:56:38.720796 kernel: pci f391:00:02.0: enabling Extended Tags Feb 9 09:56:38.720826 kernel: pci f391:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at f391:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 09:56:38.732416 kernel: pci_bus f391:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 09:56:38.737150 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:56:38.756649 kernel: pci f391:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:56:38.759374 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:56:38.779858 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:56:38.792448 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:56:38.814198 systemd[1]: Starting disk-uuid.service... Feb 9 09:56:38.820412 kernel: mlx5_core f391:00:02.0: firmware version: 16.30.1284 Feb 9 09:56:38.831908 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:56:39.018154 kernel: mlx5_core f391:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 09:56:39.078802 kernel: hv_netvsc 000d3ac5-1365-000d-3ac5-1365000d3ac5 eth0: VF registering: eth1 Feb 9 09:56:39.078994 kernel: mlx5_core f391:00:02.0 eth1: joined to eth0 Feb 9 09:56:39.091148 kernel: mlx5_core f391:00:02.0 enP62353s1: renamed from eth1 Feb 9 09:56:39.847149 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:56:39.847291 disk-uuid[593]: The operation has completed successfully. Feb 9 09:56:39.905016 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:56:39.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:39.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:39.905151 systemd[1]: Finished disk-uuid.service. Feb 9 09:56:39.915014 systemd[1]: Starting verity-setup.service... Feb 9 09:56:39.946148 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 09:56:40.008390 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:56:40.014531 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:56:40.025357 systemd[1]: Finished verity-setup.service. Feb 9 09:56:40.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.081155 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:56:40.081704 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:56:40.086227 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:56:40.087014 systemd[1]: Starting ignition-setup.service... Feb 9 09:56:40.095069 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:56:40.134424 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:56:40.134476 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:56:40.139889 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:56:40.170451 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:56:40.208077 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:56:40.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.218000 audit: BPF prog-id=9 op=LOAD Feb 9 09:56:40.221331 systemd[1]: Starting systemd-networkd.service... Feb 9 09:56:40.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.226192 systemd[1]: Finished ignition-setup.service. Feb 9 09:56:40.231991 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:56:40.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.257635 systemd-networkd[872]: lo: Link UP Feb 9 09:56:40.257638 systemd-networkd[872]: lo: Gained carrier Feb 9 09:56:40.258037 systemd-networkd[872]: Enumeration completed Feb 9 09:56:40.261702 systemd[1]: Started systemd-networkd.service. Feb 9 09:56:40.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.262202 systemd-networkd[872]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:56:40.307669 iscsid[879]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:56:40.307669 iscsid[879]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 09:56:40.307669 iscsid[879]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:56:40.307669 iscsid[879]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:56:40.307669 iscsid[879]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:56:40.307669 iscsid[879]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:56:40.307669 iscsid[879]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:56:40.405147 kernel: mlx5_core f391:00:02.0 enP62353s1: Link up Feb 9 09:56:40.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.267439 systemd[1]: Reached target network.target. Feb 9 09:56:40.434088 kernel: hv_netvsc 000d3ac5-1365-000d-3ac5-1365000d3ac5 eth0: Data path switched to VF: enP62353s1 Feb 9 09:56:40.434263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:56:40.281788 systemd[1]: Starting iscsiuio.service... Feb 9 09:56:40.290291 systemd[1]: Started iscsiuio.service. Feb 9 09:56:40.295959 systemd[1]: Starting iscsid.service... Feb 9 09:56:40.311297 systemd[1]: Started iscsid.service. Feb 9 09:56:40.324417 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:56:40.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:40.391904 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:56:40.397508 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:56:40.410427 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:56:40.423894 systemd-networkd[872]: enP62353s1: Link UP Feb 9 09:56:40.424068 systemd-networkd[872]: eth0: Link UP Feb 9 09:56:40.432496 systemd[1]: Reached target remote-fs.target. Feb 9 09:56:40.438718 systemd-networkd[872]: eth0: Gained carrier Feb 9 09:56:40.439992 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:56:40.452344 systemd-networkd[872]: enP62353s1: Gained carrier Feb 9 09:56:40.461960 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:56:40.467219 systemd-networkd[872]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:56:40.966795 ignition[874]: Ignition 2.14.0 Feb 9 09:56:40.966806 ignition[874]: Stage: fetch-offline Feb 9 09:56:40.966865 ignition[874]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:40.966890 ignition[874]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:41.002568 ignition[874]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:41.002737 ignition[874]: parsed url from cmdline: "" Feb 9 09:56:41.002741 ignition[874]: no config URL provided Feb 9 09:56:41.002750 ignition[874]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:56:41.048892 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 09:56:41.048926 kernel: audit: type=1130 audit(1707472601.018:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.009885 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:56:41.002758 ignition[874]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:56:41.019979 systemd[1]: Starting ignition-fetch.service... Feb 9 09:56:41.002770 ignition[874]: failed to fetch config: resource requires networking Feb 9 09:56:41.003043 ignition[874]: Ignition finished successfully Feb 9 09:56:41.046285 ignition[898]: Ignition 2.14.0 Feb 9 09:56:41.046292 ignition[898]: Stage: fetch Feb 9 09:56:41.046410 ignition[898]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:41.046429 ignition[898]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:41.053396 ignition[898]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:41.064568 ignition[898]: parsed url from cmdline: "" Feb 9 09:56:41.064577 ignition[898]: no config URL provided Feb 9 09:56:41.064586 ignition[898]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:56:41.064600 ignition[898]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:56:41.064639 ignition[898]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 09:56:41.191434 ignition[898]: GET result: OK Feb 9 09:56:41.191531 ignition[898]: config has been read from IMDS userdata Feb 9 09:56:41.191601 ignition[898]: parsing config with SHA512: 40017d7a8d2e2cef659768e76716ca2b0c2aab9c0ad8531a4c92fb6bade5cf67f2acd8355716224736fa0c467fe1aac05887ce1b7fec2ccc100e9570691978fc Feb 9 09:56:41.223933 unknown[898]: fetched base config from "system" Feb 9 09:56:41.229037 unknown[898]: fetched base config from "system" Feb 9 09:56:41.229046 unknown[898]: fetched user config from "azure" Feb 9 09:56:41.229741 ignition[898]: fetch: fetch complete Feb 9 09:56:41.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.238650 systemd[1]: Finished ignition-fetch.service. Feb 9 09:56:41.269999 kernel: audit: type=1130 audit(1707472601.243:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.229747 ignition[898]: fetch: fetch passed Feb 9 09:56:41.244657 systemd[1]: Starting ignition-kargs.service... Feb 9 09:56:41.229802 ignition[898]: Ignition finished successfully Feb 9 09:56:41.277857 ignition[904]: Ignition 2.14.0 Feb 9 09:56:41.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.289598 systemd[1]: Finished ignition-kargs.service. Feb 9 09:56:41.325156 kernel: audit: type=1130 audit(1707472601.294:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.277865 ignition[904]: Stage: kargs Feb 9 09:56:41.316341 systemd[1]: Starting ignition-disks.service... Feb 9 09:56:41.366683 kernel: audit: type=1130 audit(1707472601.338:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.277991 ignition[904]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:41.333074 systemd[1]: Finished ignition-disks.service. Feb 9 09:56:41.278014 ignition[904]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:41.338320 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:56:41.280909 ignition[904]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:41.369251 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:56:41.286524 ignition[904]: kargs: kargs passed Feb 9 09:56:41.378754 systemd[1]: Reached target local-fs.target. Feb 9 09:56:41.286606 ignition[904]: Ignition finished successfully Feb 9 09:56:41.387932 systemd[1]: Reached target sysinit.target. Feb 9 09:56:41.323782 ignition[910]: Ignition 2.14.0 Feb 9 09:56:41.399135 systemd[1]: Reached target basic.target. Feb 9 09:56:41.323790 ignition[910]: Stage: disks Feb 9 09:56:41.414618 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:56:41.323933 ignition[910]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:41.323954 ignition[910]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:41.328439 ignition[910]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:41.331775 ignition[910]: disks: disks passed Feb 9 09:56:41.331854 ignition[910]: Ignition finished successfully Feb 9 09:56:41.487996 systemd-fsck[918]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 09:56:41.501894 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:56:41.531316 kernel: audit: type=1130 audit(1707472601.507:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.529971 systemd[1]: Mounting sysroot.mount... Feb 9 09:56:41.555157 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:56:41.555688 systemd[1]: Mounted sysroot.mount. Feb 9 09:56:41.559820 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:56:41.577104 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:56:41.582431 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:56:41.590764 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:56:41.590798 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:56:41.597137 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:56:41.617838 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:56:41.632557 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:56:41.653823 initrd-setup-root[933]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:56:41.666774 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (928) Feb 9 09:56:41.681445 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:56:41.681506 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:56:41.687137 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:56:41.687170 initrd-setup-root[941]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:56:41.696486 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:56:41.705597 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:56:41.717768 initrd-setup-root[975]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:56:41.842409 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:56:41.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.848669 systemd[1]: Starting ignition-mount.service... Feb 9 09:56:41.879702 kernel: audit: type=1130 audit(1707472601.847:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.875299 systemd[1]: Starting sysroot-boot.service... Feb 9 09:56:41.896793 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:56:41.896910 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:56:41.922690 systemd[1]: Finished sysroot-boot.service. Feb 9 09:56:41.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.953287 kernel: audit: type=1130 audit(1707472601.927:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.962300 ignition[998]: INFO : Ignition 2.14.0 Feb 9 09:56:41.967521 ignition[998]: INFO : Stage: mount Feb 9 09:56:41.967521 ignition[998]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:41.967521 ignition[998]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:42.028210 kernel: audit: type=1130 audit(1707472601.985:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:41.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:42.028286 ignition[998]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:42.028286 ignition[998]: INFO : mount: mount passed Feb 9 09:56:42.028286 ignition[998]: INFO : Ignition finished successfully Feb 9 09:56:41.974283 systemd[1]: Finished ignition-mount.service. Feb 9 09:56:42.095181 coreos-metadata[927]: Feb 09 09:56:42.095 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 09:56:42.104638 coreos-metadata[927]: Feb 09 09:56:42.104 INFO Fetch successful Feb 9 09:56:42.131034 coreos-metadata[927]: Feb 09 09:56:42.130 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 09:56:42.146303 coreos-metadata[927]: Feb 09 09:56:42.146 INFO Fetch successful Feb 9 09:56:42.154082 coreos-metadata[927]: Feb 09 09:56:42.153 INFO wrote hostname ci-3510.3.2-a-ee2552a568 to /sysroot/etc/hostname Feb 9 09:56:42.164149 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:56:42.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:42.195523 systemd[1]: Starting ignition-files.service... Feb 9 09:56:42.204914 kernel: audit: type=1130 audit(1707472602.169:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:42.208281 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:56:42.229395 systemd-networkd[872]: eth0: Gained IPv6LL Feb 9 09:56:42.241185 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1006) Feb 9 09:56:42.241209 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:56:42.248447 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:56:42.248464 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:56:42.258596 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:56:42.274079 ignition[1025]: INFO : Ignition 2.14.0 Feb 9 09:56:42.274079 ignition[1025]: INFO : Stage: files Feb 9 09:56:42.286524 ignition[1025]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:42.286524 ignition[1025]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:42.286524 ignition[1025]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:42.286524 ignition[1025]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:56:42.323991 ignition[1025]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:56:42.323991 ignition[1025]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:56:42.357430 ignition[1025]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:56:42.365886 ignition[1025]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:56:42.374965 ignition[1025]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:56:42.374965 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:56:42.374965 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 09:56:42.365971 unknown[1025]: wrote ssh authorized keys file for user: core Feb 9 09:56:42.855037 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:56:43.023663 ignition[1025]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 09:56:43.042713 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:56:43.042713 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:56:43.042713 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 09:56:43.449405 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:56:43.781264 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 09:56:43.781264 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:56:43.804794 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 09:56:44.167780 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:56:44.420005 ignition[1025]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 09:56:44.437831 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:56:44.437831 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:56:44.437831 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 9 09:56:44.608082 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:56:44.931581 ignition[1025]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 9 09:56:44.949749 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 09:56:44.949749 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:56:44.949749 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 9 09:56:44.994619 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 09:56:45.297522 ignition[1025]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 9 09:56:45.316293 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:56:45.316293 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:56:45.316293 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 9 09:56:45.374384 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 09:56:46.028164 ignition[1025]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 9 09:56:46.046526 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:56:46.046526 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:56:46.046526 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:56:46.046526 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:56:46.100211 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:56:46.314262 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1027) Feb 9 09:56:46.314295 kernel: audit: type=1130 audit(1707472606.192:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.314307 kernel: audit: type=1130 audit(1707472606.285:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3740260864" Feb 9 09:56:46.314400 ignition[1025]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3740260864": device or resource busy Feb 9 09:56:46.314400 ignition[1025]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3740260864", trying btrfs: device or resource busy Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3740260864" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3740260864" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3740260864" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3740260864" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3550019043" Feb 9 09:56:46.314400 ignition[1025]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3550019043": device or resource busy Feb 9 09:56:46.314400 ignition[1025]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3550019043", trying btrfs: device or resource busy Feb 9 09:56:46.314400 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3550019043" Feb 9 09:56:46.646576 kernel: audit: type=1130 audit(1707472606.333:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.646608 kernel: audit: type=1131 audit(1707472606.333:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.646619 kernel: audit: type=1130 audit(1707472606.447:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.646629 kernel: audit: type=1131 audit(1707472606.477:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.646638 kernel: audit: type=1130 audit(1707472606.613:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.135796 systemd[1]: mnt-oem3740260864.mount: Deactivated successfully. Feb 9 09:56:46.657416 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3550019043" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3550019043" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3550019043" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:56:46.657416 ignition[1025]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 09:56:47.014011 kernel: audit: type=1131 audit(1707472606.727:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.014054 kernel: audit: type=1131 audit(1707472606.928:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.014065 kernel: audit: type=1131 audit(1707472606.979:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.186288 systemd[1]: Finished ignition-files.service. Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(1f): [started] setting preset to enabled for "nvidia.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(1f): [finished] setting preset to enabled for "nvidia.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(20): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(20): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(23): [started] setting preset to enabled for "waagent.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: op(23): [finished] setting preset to enabled for "waagent.service" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:56:47.024629 ignition[1025]: INFO : files: files passed Feb 9 09:56:47.024629 ignition[1025]: INFO : Ignition finished successfully Feb 9 09:56:47.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.225581 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:56:47.262500 initrd-setup-root-after-ignition[1050]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:56:47.272503 iscsid[879]: iscsid shutting down. Feb 9 09:56:46.231410 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:56:46.232400 systemd[1]: Starting ignition-quench.service... Feb 9 09:56:46.266639 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:56:46.316980 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:56:46.317087 systemd[1]: Finished ignition-quench.service. Feb 9 09:56:47.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.333844 systemd[1]: Reached target ignition-complete.target. Feb 9 09:56:46.404328 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:56:47.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.353563 ignition[1063]: INFO : Ignition 2.14.0 Feb 9 09:56:47.353563 ignition[1063]: INFO : Stage: umount Feb 9 09:56:47.353563 ignition[1063]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:56:47.353563 ignition[1063]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:56:47.353563 ignition[1063]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:56:47.353563 ignition[1063]: INFO : umount: umount passed Feb 9 09:56:47.353563 ignition[1063]: INFO : Ignition finished successfully Feb 9 09:56:47.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.442353 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:56:47.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.442450 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:56:47.458000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:56:47.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.477922 systemd[1]: Reached target initrd-fs.target. Feb 9 09:56:47.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.511953 systemd[1]: Reached target initrd.target. Feb 9 09:56:46.529274 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:56:47.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.540772 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:56:46.608780 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:56:47.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.615095 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:56:47.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.660365 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:56:47.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.675469 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:56:47.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.692548 systemd[1]: Stopped target timers.target. Feb 9 09:56:47.588173 kernel: hv_netvsc 000d3ac5-1365-000d-3ac5-1365000d3ac5 eth0: Data path switched from VF: enP62353s1 Feb 9 09:56:47.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.709149 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:56:46.709219 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:56:46.727318 systemd[1]: Stopped target initrd.target. Feb 9 09:56:46.759423 systemd[1]: Stopped target basic.target. Feb 9 09:56:47.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.771394 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:56:47.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:46.784475 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:56:46.798078 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:56:46.812538 systemd[1]: Stopped target remote-fs.target. Feb 9 09:56:46.832300 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:56:46.852309 systemd[1]: Stopped target sysinit.target. Feb 9 09:56:46.866192 systemd[1]: Stopped target local-fs.target. Feb 9 09:56:46.879382 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:56:46.897316 systemd[1]: Stopped target swap.target. Feb 9 09:56:46.914676 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:56:46.914756 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:56:46.928328 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:56:46.962404 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:56:46.962470 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:56:46.980133 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:56:46.980188 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:56:47.020107 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:56:47.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:47.020171 systemd[1]: Stopped ignition-files.service. Feb 9 09:56:47.029249 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:56:47.029292 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:56:47.050724 systemd[1]: Stopping ignition-mount.service... Feb 9 09:56:47.069925 systemd[1]: Stopping iscsid.service... Feb 9 09:56:47.095747 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:56:47.095851 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:56:47.111464 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:56:47.127187 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:56:47.127273 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:56:47.137878 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:56:47.137946 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:56:47.153804 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:56:47.153907 systemd[1]: Stopped iscsid.service. Feb 9 09:56:47.158691 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:56:47.158791 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:56:47.172820 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:56:47.771163 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 09:56:47.172948 systemd[1]: Stopped ignition-mount.service. Feb 9 09:56:47.185669 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:56:47.185735 systemd[1]: Stopped ignition-disks.service. Feb 9 09:56:47.198907 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:56:47.198963 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:56:47.219146 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:56:47.219190 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:56:47.236503 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:56:47.236551 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:56:47.246585 systemd[1]: Stopped target paths.target. Feb 9 09:56:47.256587 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:56:47.271728 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:56:47.277782 systemd[1]: Stopped target slices.target. Feb 9 09:56:47.285942 systemd[1]: Stopped target sockets.target. Feb 9 09:56:47.302365 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:56:47.302411 systemd[1]: Closed iscsid.socket. Feb 9 09:56:47.313703 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:56:47.313752 systemd[1]: Stopped ignition-setup.service. Feb 9 09:56:47.330059 systemd[1]: Stopping iscsiuio.service... Feb 9 09:56:47.339940 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:56:47.340052 systemd[1]: Stopped iscsiuio.service. Feb 9 09:56:47.349161 systemd[1]: Stopped target network.target. Feb 9 09:56:47.358278 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:56:47.358312 systemd[1]: Closed iscsiuio.socket. Feb 9 09:56:47.367146 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:56:47.376716 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:56:47.389172 systemd-networkd[872]: eth0: DHCPv6 lease lost Feb 9 09:56:47.771000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:56:47.390477 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:56:47.390587 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:56:47.414662 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:56:47.415156 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:56:47.415268 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:56:47.426409 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:56:47.426452 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:56:47.436288 systemd[1]: Stopping network-cleanup.service... Feb 9 09:56:47.446589 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:56:47.446651 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:56:47.452518 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:56:47.452570 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:56:47.467861 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:56:47.467921 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:56:47.474545 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:56:47.484777 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:56:47.485407 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:56:47.485540 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:56:47.494865 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:56:47.494909 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:56:47.508933 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:56:47.508975 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:56:47.516521 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:56:47.516579 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:56:47.527385 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:56:47.527438 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:56:47.537090 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:56:47.537148 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:56:47.547391 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:56:47.556330 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:56:47.556398 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:56:47.565383 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:56:47.565518 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:56:47.602979 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:56:47.603094 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:56:47.609850 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:56:47.609921 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:56:47.697283 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:56:47.697401 systemd[1]: Stopped network-cleanup.service. Feb 9 09:56:47.708035 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:56:47.721962 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:56:47.742036 systemd[1]: Switching root. Feb 9 09:56:47.772891 systemd-journald[276]: Journal stopped Feb 9 09:56:51.811360 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:56:51.811383 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:56:51.811394 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:56:51.811404 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:56:51.811412 kernel: SELinux: policy capability open_perms=1 Feb 9 09:56:51.811420 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:56:51.811429 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:56:51.811437 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:56:51.811445 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:56:51.811453 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:56:51.811463 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:56:51.811472 systemd[1]: Successfully loaded SELinux policy in 134.702ms. Feb 9 09:56:51.811482 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.069ms. Feb 9 09:56:51.811493 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:56:51.811504 systemd[1]: Detected virtualization microsoft. Feb 9 09:56:51.811514 systemd[1]: Detected architecture arm64. Feb 9 09:56:51.811523 systemd[1]: Detected first boot. Feb 9 09:56:51.811534 systemd[1]: Hostname set to . Feb 9 09:56:51.811543 systemd[1]: Initializing machine ID from random generator. Feb 9 09:56:51.811552 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:56:51.811561 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:56:51.811570 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:56:51.811582 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:56:51.811592 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:56:51.811602 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:56:51.811611 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:56:51.811621 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:56:51.811630 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:56:51.811642 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:56:51.811652 systemd[1]: Created slice system-getty.slice. Feb 9 09:56:51.811661 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:56:51.811670 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:56:51.811679 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:56:51.811689 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:56:51.811698 systemd[1]: Created slice user.slice. Feb 9 09:56:51.811707 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:56:51.811717 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:56:51.811727 systemd[1]: Set up automount boot.automount. Feb 9 09:56:51.811738 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:56:51.811747 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:56:51.811758 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:56:51.811768 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:56:51.811777 systemd[1]: Reached target integritysetup.target. Feb 9 09:56:51.811787 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:56:51.811796 systemd[1]: Reached target remote-fs.target. Feb 9 09:56:51.811807 systemd[1]: Reached target slices.target. Feb 9 09:56:51.811817 systemd[1]: Reached target swap.target. Feb 9 09:56:51.811826 systemd[1]: Reached target torcx.target. Feb 9 09:56:51.811835 systemd[1]: Reached target veritysetup.target. Feb 9 09:56:51.811845 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:56:51.811854 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:56:51.811863 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:56:51.811876 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:56:51.811885 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:56:51.811895 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:56:51.811905 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:56:51.811915 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:56:51.811924 systemd[1]: Mounting media.mount... Feb 9 09:56:51.811934 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:56:51.811946 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:56:51.811956 systemd[1]: Mounting tmp.mount... Feb 9 09:56:51.811966 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:56:51.811976 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:56:51.811985 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:56:51.811995 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:56:51.812005 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:56:51.812015 systemd[1]: Starting modprobe@drm.service... Feb 9 09:56:51.812024 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:56:51.812035 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:56:51.812045 systemd[1]: Starting modprobe@loop.service... Feb 9 09:56:51.812055 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:56:51.812065 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:56:51.812075 kernel: fuse: init (API version 7.34) Feb 9 09:56:51.812084 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:56:51.812093 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 09:56:51.812103 kernel: audit: type=1131 audit(1707472611.590:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.812114 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:56:51.812132 kernel: loop: module loaded Feb 9 09:56:51.812142 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:56:51.812152 kernel: audit: type=1131 audit(1707472611.639:107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.812162 systemd[1]: Stopped systemd-journald.service. Feb 9 09:56:51.812172 kernel: audit: type=1130 audit(1707472611.671:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.812181 systemd[1]: systemd-journald.service: Consumed 3.507s CPU time. Feb 9 09:56:51.812192 kernel: audit: type=1131 audit(1707472611.671:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.812202 kernel: audit: type=1334 audit(1707472611.719:110): prog-id=18 op=LOAD Feb 9 09:56:51.812211 kernel: audit: type=1334 audit(1707472611.726:111): prog-id=19 op=LOAD Feb 9 09:56:51.812220 kernel: audit: type=1334 audit(1707472611.732:112): prog-id=20 op=LOAD Feb 9 09:56:51.812229 systemd[1]: Starting systemd-journald.service... Feb 9 09:56:51.812238 kernel: audit: type=1334 audit(1707472611.732:113): prog-id=16 op=UNLOAD Feb 9 09:56:51.812247 kernel: audit: type=1334 audit(1707472611.732:114): prog-id=17 op=UNLOAD Feb 9 09:56:51.812257 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:56:51.812266 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:56:51.812277 kernel: audit: type=1305 audit(1707472611.795:115): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:56:51.812286 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:56:51.812301 systemd-journald[1204]: Journal started Feb 9 09:56:51.812345 systemd-journald[1204]: Runtime Journal (/run/log/journal/0698587805814a3badec64c145f0df57) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:56:48.332000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:56:48.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:56:48.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:56:48.571000 audit: BPF prog-id=10 op=LOAD Feb 9 09:56:48.571000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:56:48.571000 audit: BPF prog-id=11 op=LOAD Feb 9 09:56:48.571000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:56:48.850000 audit[1097]: AVC avc: denied { associate } for pid=1097 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:56:48.850000 audit[1097]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022802 a1=4000028ae0 a2=4000026d00 a3=32 items=0 ppid=1080 pid=1097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:48.850000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:56:48.861000 audit[1097]: AVC avc: denied { associate } for pid=1097 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:56:48.861000 audit[1097]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228d9 a2=1ed a3=0 items=2 ppid=1080 pid=1097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:48.861000 audit: CWD cwd="/" Feb 9 09:56:48.861000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:48.861000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:48.861000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:56:50.992000 audit: BPF prog-id=12 op=LOAD Feb 9 09:56:50.992000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:56:50.992000 audit: BPF prog-id=13 op=LOAD Feb 9 09:56:50.992000 audit: BPF prog-id=14 op=LOAD Feb 9 09:56:50.993000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:56:50.993000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:56:50.994000 audit: BPF prog-id=15 op=LOAD Feb 9 09:56:50.994000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:56:50.994000 audit: BPF prog-id=16 op=LOAD Feb 9 09:56:50.994000 audit: BPF prog-id=17 op=LOAD Feb 9 09:56:50.994000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:56:50.994000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:56:50.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.009000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:56:51.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.719000 audit: BPF prog-id=18 op=LOAD Feb 9 09:56:51.726000 audit: BPF prog-id=19 op=LOAD Feb 9 09:56:51.732000 audit: BPF prog-id=20 op=LOAD Feb 9 09:56:51.732000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:56:51.732000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:56:51.795000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:56:50.991532 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:56:48.837537 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:56:50.994790 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:56:48.845668 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:56:50.995190 systemd[1]: systemd-journald.service: Consumed 3.507s CPU time. Feb 9 09:56:48.845691 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:56:48.845735 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:56:48.845745 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:56:48.845788 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:56:48.845801 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:56:48.846016 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:56:48.846046 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:56:51.795000 audit[1204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc950e440 a2=4000 a3=1 items=0 ppid=1 pid=1204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:51.795000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:56:48.846059 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:56:48.846428 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:56:48.846465 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:56:48.846484 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:56:48.846498 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:56:48.846515 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:56:48.846528 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:56:50.526688 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:56:50.526957 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:56:50.527051 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:56:50.527236 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:56:50.527286 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:56:50.527342 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-02-09T09:56:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:56:51.833342 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:56:51.845817 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:56:51.846958 systemd[1]: Stopped verity-setup.service. Feb 9 09:56:51.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.865410 systemd[1]: Started systemd-journald.service. Feb 9 09:56:51.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.866078 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:56:51.871272 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:56:51.876239 systemd[1]: Mounted media.mount. Feb 9 09:56:51.881114 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:56:51.886672 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:56:51.892168 systemd[1]: Mounted tmp.mount. Feb 9 09:56:51.896525 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:56:51.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.902337 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:56:51.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.908435 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:56:51.908577 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:56:51.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.914359 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:56:51.914499 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:56:51.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.920204 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:56:51.920341 systemd[1]: Finished modprobe@drm.service. Feb 9 09:56:51.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.926005 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:56:51.926156 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:56:51.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.932107 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:56:51.932372 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:56:51.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.937736 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:56:51.937858 systemd[1]: Finished modprobe@loop.service. Feb 9 09:56:51.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.943512 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:56:51.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.949444 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:56:51.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.956324 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:56:51.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.962423 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:56:51.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:51.969088 systemd[1]: Reached target network-pre.target. Feb 9 09:56:51.976277 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:56:51.982923 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:56:51.988038 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:56:51.992909 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:56:51.999355 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:56:52.005799 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:56:52.007155 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:56:52.012279 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:56:52.013572 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:56:52.020853 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:56:52.027215 systemd-journald[1204]: Time spent on flushing to /var/log/journal/0698587805814a3badec64c145f0df57 is 22.802ms for 1115 entries. Feb 9 09:56:52.027215 systemd-journald[1204]: System Journal (/var/log/journal/0698587805814a3badec64c145f0df57) is 8.0M, max 2.6G, 2.6G free. Feb 9 09:56:52.100201 systemd-journald[1204]: Received client request to flush runtime journal. Feb 9 09:56:52.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.036008 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:56:52.100525 udevadm[1218]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 09:56:52.044631 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:56:52.053507 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:56:52.059173 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:56:52.067013 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:56:52.082198 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:56:52.101190 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:56:52.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.183964 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:56:52.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.559467 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:56:52.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.565000 audit: BPF prog-id=21 op=LOAD Feb 9 09:56:52.565000 audit: BPF prog-id=22 op=LOAD Feb 9 09:56:52.565000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:56:52.565000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:56:52.566789 systemd[1]: Starting systemd-udevd.service... Feb 9 09:56:52.587550 systemd-udevd[1221]: Using default interface naming scheme 'v252'. Feb 9 09:56:52.635722 systemd[1]: Started systemd-udevd.service. Feb 9 09:56:52.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.646000 audit: BPF prog-id=23 op=LOAD Feb 9 09:56:52.649264 systemd[1]: Starting systemd-networkd.service... Feb 9 09:56:52.671000 audit: BPF prog-id=24 op=LOAD Feb 9 09:56:52.671000 audit: BPF prog-id=25 op=LOAD Feb 9 09:56:52.671000 audit: BPF prog-id=26 op=LOAD Feb 9 09:56:52.672533 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:56:52.703229 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 09:56:52.733228 systemd[1]: Started systemd-userdbd.service. Feb 9 09:56:52.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.778000 audit[1229]: AVC avc: denied { confidentiality } for pid=1229 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:56:52.812562 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:56:52.812649 kernel: hv_vmbus: registering driver hv_balloon Feb 9 09:56:52.812665 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 09:56:52.812704 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 09:56:52.812720 kernel: hv_vmbus: registering driver hv_utils Feb 9 09:56:52.833721 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 09:56:52.833822 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 09:56:52.847801 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 09:56:52.847974 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 09:56:52.858288 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 09:56:52.858367 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 09:56:52.863293 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 09:56:52.863373 kernel: Console: switching to colour dummy device 80x25 Feb 9 09:56:52.445132 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:56:52.508487 systemd-journald[1204]: Time jumped backwards, rotating. Feb 9 09:56:52.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.778000 audit[1229]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab004d5ef0 a1=aa2c a2=ffff851a24b0 a3=aaab00434010 items=12 ppid=1221 pid=1229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:52.778000 audit: CWD cwd="/" Feb 9 09:56:52.778000 audit: PATH item=0 name=(null) inode=7193 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=1 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=2 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=3 name=(null) inode=9991 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=4 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=5 name=(null) inode=9992 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=6 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=7 name=(null) inode=9993 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=8 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=9 name=(null) inode=9994 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=10 name=(null) inode=9990 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PATH item=11 name=(null) inode=9995 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:56:52.778000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:56:52.470550 systemd-networkd[1242]: lo: Link UP Feb 9 09:56:52.470555 systemd-networkd[1242]: lo: Gained carrier Feb 9 09:56:52.471049 systemd-networkd[1242]: Enumeration completed Feb 9 09:56:52.471182 systemd[1]: Started systemd-networkd.service. Feb 9 09:56:52.480672 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:56:52.493985 systemd-networkd[1242]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:56:52.539141 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1223) Feb 9 09:56:52.552159 kernel: mlx5_core f391:00:02.0 enP62353s1: Link up Feb 9 09:56:52.569274 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:56:52.585087 kernel: hv_netvsc 000d3ac5-1365-000d-3ac5-1365000d3ac5 eth0: Data path switched to VF: enP62353s1 Feb 9 09:56:52.586833 systemd-networkd[1242]: enP62353s1: Link UP Feb 9 09:56:52.587500 systemd-networkd[1242]: eth0: Link UP Feb 9 09:56:52.587646 systemd-networkd[1242]: eth0: Gained carrier Feb 9 09:56:52.591721 systemd-networkd[1242]: enP62353s1: Gained carrier Feb 9 09:56:52.598611 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:56:52.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.606308 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:56:52.607007 systemd-networkd[1242]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:56:52.680948 lvm[1300]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:56:52.712140 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:56:52.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.718576 systemd[1]: Reached target cryptsetup.target. Feb 9 09:56:52.725614 systemd[1]: Starting lvm2-activation.service... Feb 9 09:56:52.730327 lvm[1301]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:56:52.756160 systemd[1]: Finished lvm2-activation.service. Feb 9 09:56:52.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:52.762368 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:56:52.768246 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:56:52.768284 systemd[1]: Reached target local-fs.target. Feb 9 09:56:52.773598 systemd[1]: Reached target machines.target. Feb 9 09:56:52.780769 systemd[1]: Starting ldconfig.service... Feb 9 09:56:52.785996 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:56:52.786067 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:56:52.787471 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:56:52.794037 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:56:52.803107 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:56:52.811327 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:56:52.811393 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:56:52.815286 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:56:52.825180 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1303 (bootctl) Feb 9 09:56:52.826715 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:56:53.422708 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:56:53.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.463399 systemd-tmpfiles[1306]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:56:53.469516 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:56:53.470948 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:56:53.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.489809 systemd-tmpfiles[1306]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:56:53.503905 systemd-fsck[1311]: fsck.fat 4.2 (2021-01-31) Feb 9 09:56:53.503905 systemd-fsck[1311]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 09:56:53.505582 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:56:53.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.515263 systemd[1]: Mounting boot.mount... Feb 9 09:56:53.521100 systemd-tmpfiles[1306]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:56:53.529767 systemd[1]: Mounted boot.mount. Feb 9 09:56:53.541422 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:56:53.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.722523 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:56:53.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.730175 systemd[1]: Starting audit-rules.service... Feb 9 09:56:53.736333 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:56:53.742997 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:56:53.749000 audit: BPF prog-id=27 op=LOAD Feb 9 09:56:53.751910 systemd[1]: Starting systemd-resolved.service... Feb 9 09:56:53.758000 audit: BPF prog-id=28 op=LOAD Feb 9 09:56:53.760562 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:56:53.768186 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:56:53.775158 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:56:53.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.782185 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:56:53.790000 audit[1328]: SYSTEM_BOOT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.795304 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:56:53.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.808872 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:56:53.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.847594 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:56:53.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:56:53.853725 systemd[1]: Reached target time-set.target. Feb 9 09:56:53.877958 systemd-resolved[1324]: Positive Trust Anchors: Feb 9 09:56:53.877972 systemd-resolved[1324]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:56:53.878000 systemd-resolved[1324]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:56:53.890000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:56:53.890000 audit[1338]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa80b230 a2=420 a3=0 items=0 ppid=1317 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:56:53.890000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:56:53.894525 augenrules[1338]: No rules Feb 9 09:56:53.895617 systemd[1]: Finished audit-rules.service. Feb 9 09:56:53.900677 systemd-resolved[1324]: Using system hostname 'ci-3510.3.2-a-ee2552a568'. Feb 9 09:56:53.902203 systemd[1]: Started systemd-resolved.service. Feb 9 09:56:53.907922 systemd[1]: Reached target network.target. Feb 9 09:56:53.913492 systemd[1]: Reached target nss-lookup.target. Feb 9 09:56:54.048247 systemd-timesyncd[1327]: Contacted time server 204.17.205.27:123 (0.flatcar.pool.ntp.org). Feb 9 09:56:54.048317 systemd-timesyncd[1327]: Initial clock synchronization to Fri 2024-02-09 09:56:54.049617 UTC. Feb 9 09:56:54.405190 systemd-networkd[1242]: eth0: Gained IPv6LL Feb 9 09:56:54.407434 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:56:54.414400 systemd[1]: Reached target network-online.target. Feb 9 09:56:55.145597 ldconfig[1302]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:56:55.158342 systemd[1]: Finished ldconfig.service. Feb 9 09:56:55.164813 systemd[1]: Starting systemd-update-done.service... Feb 9 09:56:55.183508 systemd[1]: Finished systemd-update-done.service. Feb 9 09:56:55.189734 systemd[1]: Reached target sysinit.target. Feb 9 09:56:55.195262 systemd[1]: Started motdgen.path. Feb 9 09:56:55.199713 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:56:55.207388 systemd[1]: Started logrotate.timer. Feb 9 09:56:55.212144 systemd[1]: Started mdadm.timer. Feb 9 09:56:55.216365 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:56:55.222174 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:56:55.222207 systemd[1]: Reached target paths.target. Feb 9 09:56:55.227392 systemd[1]: Reached target timers.target. Feb 9 09:56:55.232562 systemd[1]: Listening on dbus.socket. Feb 9 09:56:55.238523 systemd[1]: Starting docker.socket... Feb 9 09:56:55.245462 systemd[1]: Listening on sshd.socket. Feb 9 09:56:55.250504 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:56:55.251101 systemd[1]: Listening on docker.socket. Feb 9 09:56:55.256185 systemd[1]: Reached target sockets.target. Feb 9 09:56:55.261304 systemd[1]: Reached target basic.target. Feb 9 09:56:55.266534 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:56:55.266564 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:56:55.267909 systemd[1]: Starting containerd.service... Feb 9 09:56:55.273790 systemd[1]: Starting dbus.service... Feb 9 09:56:55.278906 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:56:55.285320 systemd[1]: Starting extend-filesystems.service... Feb 9 09:56:55.293435 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:56:55.294937 systemd[1]: Starting motdgen.service... Feb 9 09:56:55.296193 jq[1348]: false Feb 9 09:56:55.300486 systemd[1]: Started nvidia.service. Feb 9 09:56:55.306779 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:56:55.314603 systemd[1]: Starting prepare-critools.service... Feb 9 09:56:55.321713 systemd[1]: Starting prepare-helm.service... Feb 9 09:56:55.324007 extend-filesystems[1349]: Found sda Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda1 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda2 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda3 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found usr Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda4 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda6 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda7 Feb 9 09:56:55.346368 extend-filesystems[1349]: Found sda9 Feb 9 09:56:55.346368 extend-filesystems[1349]: Checking size of /dev/sda9 Feb 9 09:56:55.329357 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:56:55.628979 extend-filesystems[1349]: Old size kept for /dev/sda9 Feb 9 09:56:55.628979 extend-filesystems[1349]: Found sr0 Feb 9 09:56:55.431613 dbus-daemon[1347]: [system] SELinux support is enabled Feb 9 09:56:55.355904 systemd[1]: Starting sshd-keygen.service... Feb 9 09:56:55.366965 systemd[1]: Starting systemd-logind.service... Feb 9 09:56:55.372697 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:56:55.372769 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:56:55.721186 update_engine[1376]: I0209 09:56:55.605572 1376 main.cc:92] Flatcar Update Engine starting Feb 9 09:56:55.721186 update_engine[1376]: I0209 09:56:55.623973 1376 update_check_scheduler.cc:74] Next update check in 9m46s Feb 9 09:56:55.373374 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:56:55.721497 jq[1380]: true Feb 9 09:56:55.378663 systemd[1]: Starting update-engine.service... Feb 9 09:56:55.398067 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:56:55.721858 tar[1383]: ./ Feb 9 09:56:55.721858 tar[1383]: ./loopback Feb 9 09:56:55.721858 tar[1383]: ./bandwidth Feb 9 09:56:55.415915 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:56:55.726331 tar[1385]: linux-arm64/helm Feb 9 09:56:55.416137 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:56:55.726634 tar[1384]: crictl Feb 9 09:56:55.416456 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:56:55.726873 env[1396]: time="2024-02-09T09:56:55.604796549Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:56:55.416608 systemd[1]: Finished extend-filesystems.service. Feb 9 09:56:55.727159 jq[1395]: true Feb 9 09:56:55.423570 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:56:55.423725 systemd[1]: Finished motdgen.service. Feb 9 09:56:55.727434 bash[1425]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:56:55.432421 systemd[1]: Started dbus.service. Feb 9 09:56:55.447726 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:56:55.736312 env[1396]: time="2024-02-09T09:56:55.734566677Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:56:55.736312 env[1396]: time="2024-02-09T09:56:55.734785257Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.447927 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:56:55.502484 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:56:55.502511 systemd[1]: Reached target system-config.target. Feb 9 09:56:55.541932 systemd-logind[1374]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 9 09:56:55.544332 systemd-logind[1374]: New seat seat0. Feb 9 09:56:55.556814 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:56:55.556841 systemd[1]: Reached target user-config.target. Feb 9 09:56:55.570091 systemd[1]: Started systemd-logind.service. Feb 9 09:56:55.604569 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 09:56:55.623943 systemd[1]: Started update-engine.service. Feb 9 09:56:55.654720 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:56:55.702640 systemd[1]: Started locksmithd.service. Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741413753Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741458197Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741701499Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741718381Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741733782Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741743863Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.741813310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.743788 env[1396]: time="2024-02-09T09:56:55.742032730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:56:55.744473 env[1396]: time="2024-02-09T09:56:55.744220893Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:56:55.744473 env[1396]: time="2024-02-09T09:56:55.744252736Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:56:55.744473 env[1396]: time="2024-02-09T09:56:55.744342344Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:56:55.744473 env[1396]: time="2024-02-09T09:56:55.744356506Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758604749Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758667954Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758683316Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758793846Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758827569Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758841731Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.758856132Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.759295253Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.759327896Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.759341897Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.759356298Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.759480 env[1396]: time="2024-02-09T09:56:55.759369500Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:56:55.760347 env[1396]: time="2024-02-09T09:56:55.759894948Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:56:55.760347 env[1396]: time="2024-02-09T09:56:55.760011679Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:56:55.760442 env[1396]: time="2024-02-09T09:56:55.760373313Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:56:55.760442 env[1396]: time="2024-02-09T09:56:55.760420317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760442 env[1396]: time="2024-02-09T09:56:55.760435359Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:56:55.760512 env[1396]: time="2024-02-09T09:56:55.760488683Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760512 env[1396]: time="2024-02-09T09:56:55.760503645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760559 env[1396]: time="2024-02-09T09:56:55.760517766Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760559 env[1396]: time="2024-02-09T09:56:55.760530567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760559 env[1396]: time="2024-02-09T09:56:55.760543569Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760613 env[1396]: time="2024-02-09T09:56:55.760564811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760613 env[1396]: time="2024-02-09T09:56:55.760576652Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760613 env[1396]: time="2024-02-09T09:56:55.760588933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760613 env[1396]: time="2024-02-09T09:56:55.760603854Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:56:55.760793 env[1396]: time="2024-02-09T09:56:55.760747868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760793 env[1396]: time="2024-02-09T09:56:55.760775110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760793 env[1396]: time="2024-02-09T09:56:55.760790071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.760872 env[1396]: time="2024-02-09T09:56:55.760802593Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:56:55.760872 env[1396]: time="2024-02-09T09:56:55.760819794Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:56:55.760872 env[1396]: time="2024-02-09T09:56:55.760838716Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:56:55.760872 env[1396]: time="2024-02-09T09:56:55.760858238Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:56:55.760951 env[1396]: time="2024-02-09T09:56:55.760893321Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:56:55.761196 env[1396]: time="2024-02-09T09:56:55.761136584Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.761201310Z" level=info msg="Connect containerd service" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.761236713Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.761931017Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762101873Z" level=info msg="Start subscribing containerd event" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762160799Z" level=info msg="Start recovering state" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762218644Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762236606Z" level=info msg="Start event monitor" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762257288Z" level=info msg="Start snapshots syncer" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762260848Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762268889Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:56:55.767533 env[1396]: time="2024-02-09T09:56:55.762357737Z" level=info msg="Start streaming server" Feb 9 09:56:55.767822 tar[1383]: ./ptp Feb 9 09:56:55.762394 systemd[1]: Started containerd.service. Feb 9 09:56:55.781970 env[1396]: time="2024-02-09T09:56:55.781930074Z" level=info msg="containerd successfully booted in 0.181470s" Feb 9 09:56:55.827454 tar[1383]: ./vlan Feb 9 09:56:55.870573 tar[1383]: ./host-device Feb 9 09:56:55.910690 tar[1383]: ./tuning Feb 9 09:56:55.947594 tar[1383]: ./vrf Feb 9 09:56:55.986153 tar[1383]: ./sbr Feb 9 09:56:56.023955 tar[1383]: ./tap Feb 9 09:56:56.067329 tar[1383]: ./dhcp Feb 9 09:56:56.173457 tar[1383]: ./static Feb 9 09:56:56.219763 tar[1383]: ./firewall Feb 9 09:56:56.292770 tar[1383]: ./macvlan Feb 9 09:56:56.371325 tar[1383]: ./dummy Feb 9 09:56:56.442831 tar[1383]: ./bridge Feb 9 09:56:56.516813 tar[1383]: ./ipvlan Feb 9 09:56:56.533437 tar[1385]: linux-arm64/LICENSE Feb 9 09:56:56.533571 tar[1385]: linux-arm64/README.md Feb 9 09:56:56.542154 systemd[1]: Finished prepare-helm.service. Feb 9 09:56:56.557801 systemd[1]: Finished prepare-critools.service. Feb 9 09:56:56.576206 tar[1383]: ./portmap Feb 9 09:56:56.608394 tar[1383]: ./host-local Feb 9 09:56:56.654539 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:56:57.005921 locksmithd[1440]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:56:57.595890 sshd_keygen[1375]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:56:57.615202 systemd[1]: Finished sshd-keygen.service. Feb 9 09:56:57.622351 systemd[1]: Starting issuegen.service... Feb 9 09:56:57.629128 systemd[1]: Started waagent.service. Feb 9 09:56:57.634779 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:56:57.634995 systemd[1]: Finished issuegen.service. Feb 9 09:56:57.641974 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:56:57.657602 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:56:57.665699 systemd[1]: Started getty@tty1.service. Feb 9 09:56:57.672701 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 09:56:57.679002 systemd[1]: Reached target getty.target. Feb 9 09:56:57.684206 systemd[1]: Reached target multi-user.target. Feb 9 09:56:57.691418 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:56:57.705259 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:56:57.705440 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:56:57.713917 systemd[1]: Startup finished in 796ms (kernel) + 11.509s (initrd) + 9.978s (userspace) = 22.283s. Feb 9 09:56:57.880855 login[1466]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 09:56:57.883778 login[1465]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:56:57.904153 systemd[1]: Created slice user-500.slice. Feb 9 09:56:57.905341 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:56:57.907952 systemd-logind[1374]: New session 1 of user core. Feb 9 09:56:57.923412 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:56:57.925026 systemd[1]: Starting user@500.service... Feb 9 09:56:57.936054 (systemd)[1469]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:56:58.082111 systemd[1469]: Queued start job for default target default.target. Feb 9 09:56:58.083345 systemd[1469]: Reached target paths.target. Feb 9 09:56:58.083502 systemd[1469]: Reached target sockets.target. Feb 9 09:56:58.083627 systemd[1469]: Reached target timers.target. Feb 9 09:56:58.083701 systemd[1469]: Reached target basic.target. Feb 9 09:56:58.083851 systemd[1469]: Reached target default.target. Feb 9 09:56:58.083938 systemd[1]: Started user@500.service. Feb 9 09:56:58.084696 systemd[1469]: Startup finished in 141ms. Feb 9 09:56:58.084959 systemd[1]: Started session-1.scope. Feb 9 09:56:58.882410 login[1466]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:56:58.887431 systemd[1]: Started session-2.scope. Feb 9 09:56:58.887817 systemd-logind[1374]: New session 2 of user core. Feb 9 09:56:59.720702 waagent[1463]: 2024-02-09T09:56:59.720578Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 09:56:59.729192 waagent[1463]: 2024-02-09T09:56:59.729064Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 09:56:59.735529 waagent[1463]: 2024-02-09T09:56:59.735429Z INFO Daemon Daemon Python: 3.9.16 Feb 9 09:56:59.741736 waagent[1463]: 2024-02-09T09:56:59.741595Z INFO Daemon Daemon Run daemon Feb 9 09:56:59.747446 waagent[1463]: 2024-02-09T09:56:59.747357Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 09:56:59.768456 waagent[1463]: 2024-02-09T09:56:59.768267Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:56:59.792400 waagent[1463]: 2024-02-09T09:56:59.792202Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:56:59.804830 waagent[1463]: 2024-02-09T09:56:59.804716Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:56:59.811240 waagent[1463]: 2024-02-09T09:56:59.811151Z INFO Daemon Daemon Using waagent for provisioning Feb 9 09:56:59.818271 waagent[1463]: 2024-02-09T09:56:59.818177Z INFO Daemon Daemon Activate resource disk Feb 9 09:56:59.824386 waagent[1463]: 2024-02-09T09:56:59.824289Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 09:56:59.840718 waagent[1463]: 2024-02-09T09:56:59.840613Z INFO Daemon Daemon Found device: None Feb 9 09:56:59.847038 waagent[1463]: 2024-02-09T09:56:59.846938Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 09:56:59.857660 waagent[1463]: 2024-02-09T09:56:59.857570Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 09:56:59.872605 waagent[1463]: 2024-02-09T09:56:59.872522Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:56:59.879729 waagent[1463]: 2024-02-09T09:56:59.879638Z INFO Daemon Daemon Running default provisioning handler Feb 9 09:56:59.894931 waagent[1463]: 2024-02-09T09:56:59.894741Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:56:59.913549 waagent[1463]: 2024-02-09T09:56:59.913372Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:56:59.925592 waagent[1463]: 2024-02-09T09:56:59.925474Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:56:59.931922 waagent[1463]: 2024-02-09T09:56:59.931821Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 09:56:59.980584 waagent[1463]: 2024-02-09T09:56:59.980361Z INFO Daemon Daemon Successfully mounted dvd Feb 9 09:57:00.025827 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 09:57:00.038769 waagent[1463]: 2024-02-09T09:57:00.038594Z INFO Daemon Daemon Detect protocol endpoint Feb 9 09:57:00.045233 waagent[1463]: 2024-02-09T09:57:00.045111Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:57:00.052594 waagent[1463]: 2024-02-09T09:57:00.052500Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 09:57:00.061203 waagent[1463]: 2024-02-09T09:57:00.061114Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 09:57:00.068932 waagent[1463]: 2024-02-09T09:57:00.068846Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 09:57:00.075880 waagent[1463]: 2024-02-09T09:57:00.075782Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 09:57:00.115432 waagent[1463]: 2024-02-09T09:57:00.115355Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 09:57:00.124902 waagent[1463]: 2024-02-09T09:57:00.124841Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 09:57:00.132680 waagent[1463]: 2024-02-09T09:57:00.132578Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 09:57:00.708553 waagent[1463]: 2024-02-09T09:57:00.708356Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 09:57:00.727105 waagent[1463]: 2024-02-09T09:57:00.726980Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 09:57:00.734886 waagent[1463]: 2024-02-09T09:57:00.734779Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 09:57:00.982543 waagent[1463]: 2024-02-09T09:57:00.982326Z INFO Daemon Daemon Found private key matching thumbprint 8CF2247F1DA97589CF2F12F36B65FA52EE4E96FD Feb 9 09:57:00.992751 waagent[1463]: 2024-02-09T09:57:00.992652Z INFO Daemon Daemon Certificate with thumbprint 7AF1969EFDDF8BE1CA7C5076CC8813B52D2A7CC2 has no matching private key. Feb 9 09:57:01.011708 waagent[1463]: 2024-02-09T09:57:01.004437Z INFO Daemon Daemon Fetch goal state completed Feb 9 09:57:01.038659 waagent[1463]: 2024-02-09T09:57:01.038594Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 8d19613a-99ee-44ca-aba6-8e563ebf2059 New eTag: 4421758130732588927] Feb 9 09:57:01.052399 waagent[1463]: 2024-02-09T09:57:01.052293Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:57:01.071620 waagent[1463]: 2024-02-09T09:57:01.071541Z INFO Daemon Daemon Starting provisioning Feb 9 09:57:01.079164 waagent[1463]: 2024-02-09T09:57:01.079045Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 09:57:01.085486 waagent[1463]: 2024-02-09T09:57:01.085381Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-ee2552a568] Feb 9 09:57:01.523251 waagent[1463]: 2024-02-09T09:57:01.523050Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-ee2552a568] Feb 9 09:57:01.532209 waagent[1463]: 2024-02-09T09:57:01.532096Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 09:57:01.540902 waagent[1463]: 2024-02-09T09:57:01.540805Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 09:57:01.560280 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 09:57:01.560474 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 09:57:01.560539 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 09:57:01.560801 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:57:01.570135 systemd-networkd[1242]: eth0: DHCPv6 lease lost Feb 9 09:57:01.571654 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:57:01.571856 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:57:01.574410 systemd[1]: Starting systemd-networkd.service... Feb 9 09:57:01.603923 systemd-networkd[1512]: enP62353s1: Link UP Feb 9 09:57:01.603937 systemd-networkd[1512]: enP62353s1: Gained carrier Feb 9 09:57:01.604886 systemd-networkd[1512]: eth0: Link UP Feb 9 09:57:01.604900 systemd-networkd[1512]: eth0: Gained carrier Feb 9 09:57:01.605336 systemd-networkd[1512]: lo: Link UP Feb 9 09:57:01.605346 systemd-networkd[1512]: lo: Gained carrier Feb 9 09:57:01.605606 systemd-networkd[1512]: eth0: Gained IPv6LL Feb 9 09:57:01.606845 systemd-networkd[1512]: Enumeration completed Feb 9 09:57:01.606994 systemd[1]: Started systemd-networkd.service. Feb 9 09:57:01.608951 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:57:01.616098 waagent[1463]: 2024-02-09T09:57:01.610531Z INFO Daemon Daemon Create user account if not exists Feb 9 09:57:01.618794 waagent[1463]: 2024-02-09T09:57:01.618677Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 09:57:01.625795 systemd-networkd[1512]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:57:01.626975 waagent[1463]: 2024-02-09T09:57:01.626830Z INFO Daemon Daemon Configure sudoer Feb 9 09:57:01.636060 waagent[1463]: 2024-02-09T09:57:01.635936Z INFO Daemon Daemon Configure sshd Feb 9 09:57:01.642267 waagent[1463]: 2024-02-09T09:57:01.642056Z INFO Daemon Daemon Deploy ssh public key. Feb 9 09:57:01.650256 systemd-networkd[1512]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:57:01.653038 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:57:02.925938 waagent[1463]: 2024-02-09T09:57:02.925836Z INFO Daemon Daemon Provisioning complete Feb 9 09:57:02.951883 waagent[1463]: 2024-02-09T09:57:02.951804Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 09:57:02.959863 waagent[1463]: 2024-02-09T09:57:02.959769Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 09:57:02.973143 waagent[1463]: 2024-02-09T09:57:02.973031Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 09:57:03.310011 waagent[1521]: 2024-02-09T09:57:03.309849Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 09:57:03.311314 waagent[1521]: 2024-02-09T09:57:03.311235Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:03.311588 waagent[1521]: 2024-02-09T09:57:03.311540Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:03.325311 waagent[1521]: 2024-02-09T09:57:03.325201Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 09:57:03.325690 waagent[1521]: 2024-02-09T09:57:03.325638Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 09:57:03.400881 waagent[1521]: 2024-02-09T09:57:03.400727Z INFO ExtHandler ExtHandler Found private key matching thumbprint 8CF2247F1DA97589CF2F12F36B65FA52EE4E96FD Feb 9 09:57:03.401335 waagent[1521]: 2024-02-09T09:57:03.401275Z INFO ExtHandler ExtHandler Certificate with thumbprint 7AF1969EFDDF8BE1CA7C5076CC8813B52D2A7CC2 has no matching private key. Feb 9 09:57:03.401677 waagent[1521]: 2024-02-09T09:57:03.401627Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 09:57:03.416585 waagent[1521]: 2024-02-09T09:57:03.416525Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b864b987-fd56-46bc-adc4-1aeab1ddeb6c New eTag: 4421758130732588927] Feb 9 09:57:03.417434 waagent[1521]: 2024-02-09T09:57:03.417366Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:57:03.467928 waagent[1521]: 2024-02-09T09:57:03.467784Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:57:03.481637 waagent[1521]: 2024-02-09T09:57:03.481540Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1521 Feb 9 09:57:03.485783 waagent[1521]: 2024-02-09T09:57:03.485690Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:57:03.487434 waagent[1521]: 2024-02-09T09:57:03.487349Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:57:03.518631 waagent[1521]: 2024-02-09T09:57:03.518567Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:57:03.519352 waagent[1521]: 2024-02-09T09:57:03.519282Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:57:03.528389 waagent[1521]: 2024-02-09T09:57:03.528326Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:57:03.529203 waagent[1521]: 2024-02-09T09:57:03.529132Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:57:03.530619 waagent[1521]: 2024-02-09T09:57:03.530545Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 09:57:03.532408 waagent[1521]: 2024-02-09T09:57:03.532324Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:57:03.533011 waagent[1521]: 2024-02-09T09:57:03.532927Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:03.533245 waagent[1521]: 2024-02-09T09:57:03.533184Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:03.533903 waagent[1521]: 2024-02-09T09:57:03.533832Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:57:03.534327 waagent[1521]: 2024-02-09T09:57:03.534256Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:57:03.534327 waagent[1521]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:57:03.534327 waagent[1521]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:57:03.534327 waagent[1521]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:57:03.534327 waagent[1521]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:03.534327 waagent[1521]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:03.534327 waagent[1521]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:03.537105 waagent[1521]: 2024-02-09T09:57:03.536866Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:57:03.537559 waagent[1521]: 2024-02-09T09:57:03.537471Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:03.538702 waagent[1521]: 2024-02-09T09:57:03.538611Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:03.539508 waagent[1521]: 2024-02-09T09:57:03.539356Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:57:03.539714 waagent[1521]: 2024-02-09T09:57:03.539654Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:57:03.539848 waagent[1521]: 2024-02-09T09:57:03.539798Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:57:03.540973 waagent[1521]: 2024-02-09T09:57:03.540905Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:57:03.541239 waagent[1521]: 2024-02-09T09:57:03.541139Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:57:03.542029 waagent[1521]: 2024-02-09T09:57:03.541949Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:57:03.542265 waagent[1521]: 2024-02-09T09:57:03.542184Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:57:03.542550 waagent[1521]: 2024-02-09T09:57:03.542485Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:57:03.556210 waagent[1521]: 2024-02-09T09:57:03.556115Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 09:57:03.558123 waagent[1521]: 2024-02-09T09:57:03.558022Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:57:03.561370 waagent[1521]: 2024-02-09T09:57:03.561239Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 09:57:03.573228 waagent[1521]: 2024-02-09T09:57:03.573062Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1512' Feb 9 09:57:03.585613 waagent[1521]: 2024-02-09T09:57:03.585397Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:57:03.585613 waagent[1521]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:57:03.585613 waagent[1521]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:57:03.585613 waagent[1521]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:13:65 brd ff:ff:ff:ff:ff:ff Feb 9 09:57:03.585613 waagent[1521]: 3: enP62353s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:13:65 brd ff:ff:ff:ff:ff:ff\ altname enP62353p0s2 Feb 9 09:57:03.585613 waagent[1521]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:57:03.585613 waagent[1521]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:57:03.585613 waagent[1521]: 2: eth0 inet 10.200.20.33/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:57:03.585613 waagent[1521]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:57:03.585613 waagent[1521]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:57:03.585613 waagent[1521]: 2: eth0 inet6 fe80::20d:3aff:fec5:1365/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:57:03.606822 waagent[1521]: 2024-02-09T09:57:03.606746Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 09:57:03.734436 waagent[1521]: 2024-02-09T09:57:03.734316Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 09:57:03.739522 waagent[1521]: 2024-02-09T09:57:03.739367Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 09:57:03.739522 waagent[1521]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:03.739522 waagent[1521]: pkts bytes target prot opt in out source destination Feb 9 09:57:03.739522 waagent[1521]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:03.739522 waagent[1521]: pkts bytes target prot opt in out source destination Feb 9 09:57:03.739522 waagent[1521]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:03.739522 waagent[1521]: pkts bytes target prot opt in out source destination Feb 9 09:57:03.739522 waagent[1521]: 20 1040 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:57:03.739522 waagent[1521]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:57:03.742031 waagent[1521]: 2024-02-09T09:57:03.741955Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 09:57:03.750303 waagent[1521]: 2024-02-09T09:57:03.750221Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 09:57:03.976943 waagent[1463]: 2024-02-09T09:57:03.976735Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 09:57:03.980853 waagent[1463]: 2024-02-09T09:57:03.980784Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 09:57:05.210755 waagent[1560]: 2024-02-09T09:57:05.210632Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 09:57:05.212031 waagent[1560]: 2024-02-09T09:57:05.211948Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 09:57:05.212377 waagent[1560]: 2024-02-09T09:57:05.212319Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 09:57:05.222715 waagent[1560]: 2024-02-09T09:57:05.222562Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:57:05.223504 waagent[1560]: 2024-02-09T09:57:05.223421Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:05.223831 waagent[1560]: 2024-02-09T09:57:05.223773Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:05.238345 waagent[1560]: 2024-02-09T09:57:05.238226Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 09:57:05.250767 waagent[1560]: 2024-02-09T09:57:05.250690Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 09:57:05.252197 waagent[1560]: 2024-02-09T09:57:05.252116Z INFO ExtHandler Feb 9 09:57:05.252514 waagent[1560]: 2024-02-09T09:57:05.252460Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 56d71bea-1807-4945-9f1d-3e044ba5135b eTag: 4421758130732588927 source: Fabric] Feb 9 09:57:05.253472 waagent[1560]: 2024-02-09T09:57:05.253408Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 09:57:05.254953 waagent[1560]: 2024-02-09T09:57:05.254883Z INFO ExtHandler Feb 9 09:57:05.255240 waagent[1560]: 2024-02-09T09:57:05.255186Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 09:57:05.262420 waagent[1560]: 2024-02-09T09:57:05.262349Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 09:57:05.263251 waagent[1560]: 2024-02-09T09:57:05.263195Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:57:05.286823 waagent[1560]: 2024-02-09T09:57:05.286744Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 09:57:05.374604 waagent[1560]: 2024-02-09T09:57:05.374448Z INFO ExtHandler Downloaded certificate {'thumbprint': '8CF2247F1DA97589CF2F12F36B65FA52EE4E96FD', 'hasPrivateKey': True} Feb 9 09:57:05.376070 waagent[1560]: 2024-02-09T09:57:05.375991Z INFO ExtHandler Downloaded certificate {'thumbprint': '7AF1969EFDDF8BE1CA7C5076CC8813B52D2A7CC2', 'hasPrivateKey': False} Feb 9 09:57:05.377504 waagent[1560]: 2024-02-09T09:57:05.377430Z INFO ExtHandler Fetch goal state completed Feb 9 09:57:05.408023 waagent[1560]: 2024-02-09T09:57:05.407925Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1560 Feb 9 09:57:05.412176 waagent[1560]: 2024-02-09T09:57:05.412044Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:57:05.414012 waagent[1560]: 2024-02-09T09:57:05.413917Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:57:05.420970 waagent[1560]: 2024-02-09T09:57:05.420895Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:57:05.421754 waagent[1560]: 2024-02-09T09:57:05.421669Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:57:05.431153 waagent[1560]: 2024-02-09T09:57:05.431055Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:57:05.432001 waagent[1560]: 2024-02-09T09:57:05.431922Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:57:05.454298 waagent[1560]: 2024-02-09T09:57:05.454134Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 09:57:05.458443 waagent[1560]: 2024-02-09T09:57:05.458279Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 09:57:05.463126 waagent[1560]: 2024-02-09T09:57:05.462977Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 09:57:05.465206 waagent[1560]: 2024-02-09T09:57:05.465106Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:57:05.465482 waagent[1560]: 2024-02-09T09:57:05.465396Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:05.466215 waagent[1560]: 2024-02-09T09:57:05.466141Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:05.466905 waagent[1560]: 2024-02-09T09:57:05.466821Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:57:05.467335 waagent[1560]: 2024-02-09T09:57:05.467258Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:57:05.467335 waagent[1560]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:57:05.467335 waagent[1560]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:57:05.467335 waagent[1560]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:57:05.467335 waagent[1560]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:05.467335 waagent[1560]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:05.467335 waagent[1560]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:57:05.470807 waagent[1560]: 2024-02-09T09:57:05.470644Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:57:05.471265 waagent[1560]: 2024-02-09T09:57:05.471176Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:57:05.472186 waagent[1560]: 2024-02-09T09:57:05.472002Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:57:05.472455 waagent[1560]: 2024-02-09T09:57:05.472384Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:57:05.473146 waagent[1560]: 2024-02-09T09:57:05.473040Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:57:05.476802 waagent[1560]: 2024-02-09T09:57:05.476580Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:57:05.477791 waagent[1560]: 2024-02-09T09:57:05.477683Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:57:05.478207 waagent[1560]: 2024-02-09T09:57:05.478122Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:57:05.482602 waagent[1560]: 2024-02-09T09:57:05.482504Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:57:05.483898 waagent[1560]: 2024-02-09T09:57:05.483793Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:57:05.486963 waagent[1560]: 2024-02-09T09:57:05.486849Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:57:05.492356 waagent[1560]: 2024-02-09T09:57:05.492271Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:57:05.492356 waagent[1560]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:57:05.492356 waagent[1560]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:57:05.492356 waagent[1560]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:13:65 brd ff:ff:ff:ff:ff:ff Feb 9 09:57:05.492356 waagent[1560]: 3: enP62353s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:13:65 brd ff:ff:ff:ff:ff:ff\ altname enP62353p0s2 Feb 9 09:57:05.492356 waagent[1560]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:57:05.492356 waagent[1560]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:57:05.492356 waagent[1560]: 2: eth0 inet 10.200.20.33/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:57:05.492356 waagent[1560]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:57:05.492356 waagent[1560]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:57:05.492356 waagent[1560]: 2: eth0 inet6 fe80::20d:3aff:fec5:1365/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:57:05.505250 waagent[1560]: 2024-02-09T09:57:05.505142Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 09:57:05.506860 waagent[1560]: 2024-02-09T09:57:05.506767Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 09:57:05.564256 waagent[1560]: 2024-02-09T09:57:05.564063Z INFO ExtHandler ExtHandler Feb 9 09:57:05.571435 waagent[1560]: 2024-02-09T09:57:05.571296Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 702716ba-0243-417c-b9a7-f68a0f7f4969 correlation 8ab0b3fc-fd35-44bd-a3f8-392de1f2f15f created: 2024-02-09T09:56:14.230415Z] Feb 9 09:57:05.573884 waagent[1560]: 2024-02-09T09:57:05.573775Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 09:57:05.582641 waagent[1560]: 2024-02-09T09:57:05.582524Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 18 ms] Feb 9 09:57:05.612788 waagent[1560]: 2024-02-09T09:57:05.612688Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 09:57:05.612788 waagent[1560]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:05.612788 waagent[1560]: pkts bytes target prot opt in out source destination Feb 9 09:57:05.612788 waagent[1560]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:05.612788 waagent[1560]: pkts bytes target prot opt in out source destination Feb 9 09:57:05.612788 waagent[1560]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:57:05.612788 waagent[1560]: pkts bytes target prot opt in out source destination Feb 9 09:57:05.612788 waagent[1560]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:57:05.612788 waagent[1560]: 131 18497 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:57:05.612788 waagent[1560]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:57:05.620792 waagent[1560]: 2024-02-09T09:57:05.620700Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 09:57:05.634835 waagent[1560]: 2024-02-09T09:57:05.634717Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: CB9EFE8E-8C53-4634-BCDD-543CF0C1D3B7;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 09:57:40.435176 update_engine[1376]: I0209 09:57:40.435129 1376 update_attempter.cc:509] Updating boot flags... Feb 9 09:57:40.536120 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 09:57:51.253339 systemd[1]: Created slice system-sshd.slice. Feb 9 09:57:51.254648 systemd[1]: Started sshd@0-10.200.20.33:22-10.200.12.6:39948.service. Feb 9 09:57:51.718442 sshd[1667]: Accepted publickey for core from 10.200.12.6 port 39948 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:51.723987 sshd[1667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:51.729844 systemd[1]: Started session-3.scope. Feb 9 09:57:51.730323 systemd-logind[1374]: New session 3 of user core. Feb 9 09:57:52.098903 systemd[1]: Started sshd@1-10.200.20.33:22-10.200.12.6:39960.service. Feb 9 09:57:52.516457 sshd[1672]: Accepted publickey for core from 10.200.12.6 port 39960 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:52.517851 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:52.522817 systemd[1]: Started session-4.scope. Feb 9 09:57:52.523434 systemd-logind[1374]: New session 4 of user core. Feb 9 09:57:52.825444 sshd[1672]: pam_unix(sshd:session): session closed for user core Feb 9 09:57:52.828213 systemd[1]: sshd@1-10.200.20.33:22-10.200.12.6:39960.service: Deactivated successfully. Feb 9 09:57:52.829022 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:57:52.829647 systemd-logind[1374]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:57:52.830862 systemd-logind[1374]: Removed session 4. Feb 9 09:57:52.893860 systemd[1]: Started sshd@2-10.200.20.33:22-10.200.12.6:39970.service. Feb 9 09:57:53.308098 sshd[1681]: Accepted publickey for core from 10.200.12.6 port 39970 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:53.309424 sshd[1681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:53.313687 systemd-logind[1374]: New session 5 of user core. Feb 9 09:57:53.314236 systemd[1]: Started session-5.scope. Feb 9 09:57:53.609228 sshd[1681]: pam_unix(sshd:session): session closed for user core Feb 9 09:57:53.612263 systemd[1]: sshd@2-10.200.20.33:22-10.200.12.6:39970.service: Deactivated successfully. Feb 9 09:57:53.612978 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:57:53.613583 systemd-logind[1374]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:57:53.614552 systemd-logind[1374]: Removed session 5. Feb 9 09:57:53.679476 systemd[1]: Started sshd@3-10.200.20.33:22-10.200.12.6:39976.service. Feb 9 09:57:54.093437 sshd[1687]: Accepted publickey for core from 10.200.12.6 port 39976 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:54.094786 sshd[1687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:54.099162 systemd-logind[1374]: New session 6 of user core. Feb 9 09:57:54.099686 systemd[1]: Started session-6.scope. Feb 9 09:57:54.398941 sshd[1687]: pam_unix(sshd:session): session closed for user core Feb 9 09:57:54.402095 systemd[1]: sshd@3-10.200.20.33:22-10.200.12.6:39976.service: Deactivated successfully. Feb 9 09:57:54.402847 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:57:54.403464 systemd-logind[1374]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:57:54.404472 systemd-logind[1374]: Removed session 6. Feb 9 09:57:54.469328 systemd[1]: Started sshd@4-10.200.20.33:22-10.200.12.6:39988.service. Feb 9 09:57:54.883191 sshd[1693]: Accepted publickey for core from 10.200.12.6 port 39988 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:54.884527 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:54.888777 systemd-logind[1374]: New session 7 of user core. Feb 9 09:57:54.889342 systemd[1]: Started session-7.scope. Feb 9 09:57:55.181643 sudo[1696]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:57:55.181869 sudo[1696]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:57:55.203099 dbus-daemon[1347]: avc: received setenforce notice (enforcing=1) Feb 9 09:57:55.203257 sudo[1696]: pam_unix(sudo:session): session closed for user root Feb 9 09:57:55.273225 sshd[1693]: pam_unix(sshd:session): session closed for user core Feb 9 09:57:55.276646 systemd[1]: sshd@4-10.200.20.33:22-10.200.12.6:39988.service: Deactivated successfully. Feb 9 09:57:55.277521 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:57:55.278187 systemd-logind[1374]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:57:55.279373 systemd-logind[1374]: Removed session 7. Feb 9 09:57:55.345672 systemd[1]: Started sshd@5-10.200.20.33:22-10.200.12.6:39990.service. Feb 9 09:57:55.759981 sshd[1700]: Accepted publickey for core from 10.200.12.6 port 39990 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:55.761438 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:55.766061 systemd-logind[1374]: New session 8 of user core. Feb 9 09:57:55.766574 systemd[1]: Started session-8.scope. Feb 9 09:57:56.000441 sudo[1704]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:57:56.000657 sudo[1704]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:57:56.003532 sudo[1704]: pam_unix(sudo:session): session closed for user root Feb 9 09:57:56.008735 sudo[1703]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:57:56.009338 sudo[1703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:57:56.018817 systemd[1]: Stopping audit-rules.service... Feb 9 09:57:56.019000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:57:56.025256 kernel: kauditd_printk_skb: 72 callbacks suppressed Feb 9 09:57:56.025347 kernel: audit: type=1305 audit(1707472676.019:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:57:56.019000 audit[1707]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb7403a0 a2=420 a3=0 items=0 ppid=1 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:56.038572 auditctl[1707]: No rules Feb 9 09:57:56.044863 kernel: audit: type=1300 audit(1707472676.019:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb7403a0 a2=420 a3=0 items=0 ppid=1 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:56.039150 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:57:56.039333 systemd[1]: Stopped audit-rules.service. Feb 9 09:57:56.041247 systemd[1]: Starting audit-rules.service... Feb 9 09:57:56.019000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:57:56.076482 augenrules[1724]: No rules Feb 9 09:57:56.076767 kernel: audit: type=1327 audit(1707472676.019:169): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:57:56.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.077925 systemd[1]: Finished audit-rules.service. Feb 9 09:57:56.096066 kernel: audit: type=1131 audit(1707472676.038:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.097353 sudo[1703]: pam_unix(sudo:session): session closed for user root Feb 9 09:57:56.115842 kernel: audit: type=1130 audit(1707472676.077:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.096000 audit[1703]: USER_END pid=1703 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.137838 kernel: audit: type=1106 audit(1707472676.096:172): pid=1703 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.137916 kernel: audit: type=1104 audit(1707472676.096:173): pid=1703 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.096000 audit[1703]: CRED_DISP pid=1703 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.180748 sshd[1700]: pam_unix(sshd:session): session closed for user core Feb 9 09:57:56.180000 audit[1700]: USER_END pid=1700 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.183637 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:57:56.184332 systemd[1]: sshd@5-10.200.20.33:22-10.200.12.6:39990.service: Deactivated successfully. Feb 9 09:57:56.185905 systemd-logind[1374]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:57:56.186722 systemd-logind[1374]: Removed session 8. Feb 9 09:57:56.180000 audit[1700]: CRED_DISP pid=1700 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.231509 kernel: audit: type=1106 audit(1707472676.180:174): pid=1700 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.231582 kernel: audit: type=1104 audit(1707472676.180:175): pid=1700 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.33:22-10.200.12.6:39990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.253196 kernel: audit: type=1131 audit(1707472676.180:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.33:22-10.200.12.6:39990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.255929 systemd[1]: Started sshd@6-10.200.20.33:22-10.200.12.6:40006.service. Feb 9 09:57:56.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.12.6:40006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.674000 audit[1730]: USER_ACCT pid=1730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.675686 sshd[1730]: Accepted publickey for core from 10.200.12.6 port 40006 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:57:56.675000 audit[1730]: CRED_ACQ pid=1730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.676000 audit[1730]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe622b150 a2=3 a3=1 items=0 ppid=1 pid=1730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:56.676000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:57:56.677437 sshd[1730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:56.681564 systemd-logind[1374]: New session 9 of user core. Feb 9 09:57:56.682126 systemd[1]: Started session-9.scope. Feb 9 09:57:56.685000 audit[1730]: USER_START pid=1730 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.687000 audit[1732]: CRED_ACQ pid=1732 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:57:56.916000 audit[1733]: USER_ACCT pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.917000 audit[1733]: CRED_REFR pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:56.918297 sudo[1733]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:57:56.918537 sudo[1733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:57:56.919000 audit[1733]: USER_START pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:57:57.487326 systemd[1]: Starting docker.service... Feb 9 09:57:57.522541 env[1749]: time="2024-02-09T09:57:57.522478837Z" level=info msg="Starting up" Feb 9 09:57:57.524976 env[1749]: time="2024-02-09T09:57:57.524927842Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:57:57.524976 env[1749]: time="2024-02-09T09:57:57.524965682Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:57:57.525157 env[1749]: time="2024-02-09T09:57:57.524991802Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:57:57.525157 env[1749]: time="2024-02-09T09:57:57.525004402Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:57:57.527519 env[1749]: time="2024-02-09T09:57:57.527476406Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 09:57:57.527519 env[1749]: time="2024-02-09T09:57:57.527508166Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 09:57:57.527692 env[1749]: time="2024-02-09T09:57:57.527528286Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 09:57:57.527692 env[1749]: time="2024-02-09T09:57:57.527538686Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 09:57:57.677125 env[1749]: time="2024-02-09T09:57:57.677056860Z" level=info msg="Loading containers: start." Feb 9 09:57:57.713000 audit[1776]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.713000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff5a0c2a0 a2=0 a3=1 items=0 ppid=1749 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 09:57:57.715000 audit[1778]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.715000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe964d590 a2=0 a3=1 items=0 ppid=1749 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.715000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 09:57:57.717000 audit[1780]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.717000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc0af9250 a2=0 a3=1 items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.717000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:57:57.719000 audit[1782]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.719000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe5eff8c0 a2=0 a3=1 items=0 ppid=1749 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.719000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:57:57.720000 audit[1784]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.720000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce56d590 a2=0 a3=1 items=0 ppid=1749 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.720000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 09:57:57.722000 audit[1786]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.722000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdc5ce510 a2=0 a3=1 items=0 ppid=1749 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.722000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 09:57:57.739000 audit[1788]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.739000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffc392ee0 a2=0 a3=1 items=0 ppid=1749 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 09:57:57.741000 audit[1790]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.741000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffea310d60 a2=0 a3=1 items=0 ppid=1749 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 09:57:57.743000 audit[1792]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.743000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdb2fb1e0 a2=0 a3=1 items=0 ppid=1749 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:57:57.760000 audit[1796]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.760000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff3130190 a2=0 a3=1 items=0 ppid=1749 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:57:57.761000 audit[1797]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.761000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc45dd060 a2=0 a3=1 items=0 ppid=1749 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:57:57.776105 kernel: Initializing XFRM netlink socket Feb 9 09:57:57.787324 env[1749]: time="2024-02-09T09:57:57.787287687Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 09:57:57.812000 audit[1805]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.812000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff6154980 a2=0 a3=1 items=0 ppid=1749 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.812000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 09:57:57.830000 audit[1808]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.830000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe818c9d0 a2=0 a3=1 items=0 ppid=1749 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 09:57:57.834000 audit[1811]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.834000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff29d4120 a2=0 a3=1 items=0 ppid=1749 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 09:57:57.836000 audit[1813]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.836000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff6d5f130 a2=0 a3=1 items=0 ppid=1749 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.836000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 09:57:57.838000 audit[1815]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.838000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff4078780 a2=0 a3=1 items=0 ppid=1749 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 09:57:57.840000 audit[1817]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.840000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd73e5db0 a2=0 a3=1 items=0 ppid=1749 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 09:57:57.842000 audit[1819]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.842000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe966d320 a2=0 a3=1 items=0 ppid=1749 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 09:57:57.844000 audit[1821]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.844000 audit[1821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd37b9d30 a2=0 a3=1 items=0 ppid=1749 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 09:57:57.847000 audit[1823]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.847000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffeae48a0 a2=0 a3=1 items=0 ppid=1749 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 09:57:57.849000 audit[1825]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.849000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc33b2850 a2=0 a3=1 items=0 ppid=1749 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 09:57:57.851000 audit[1827]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.851000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff07e0550 a2=0 a3=1 items=0 ppid=1749 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.851000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 09:57:57.852737 systemd-networkd[1512]: docker0: Link UP Feb 9 09:57:57.873000 audit[1831]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.873000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe15044a0 a2=0 a3=1 items=0 ppid=1749 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.873000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:57:57.874000 audit[1832]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:57:57.874000 audit[1832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd369dc70 a2=0 a3=1 items=0 ppid=1749 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:57.874000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 09:57:57.876121 env[1749]: time="2024-02-09T09:57:57.876055118Z" level=info msg="Loading containers: done." Feb 9 09:57:57.886676 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1726629946-merged.mount: Deactivated successfully. Feb 9 09:57:57.924430 env[1749]: time="2024-02-09T09:57:57.924381680Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 09:57:57.924853 env[1749]: time="2024-02-09T09:57:57.924830481Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 09:57:57.925047 env[1749]: time="2024-02-09T09:57:57.925028721Z" level=info msg="Daemon has completed initialization" Feb 9 09:57:57.960174 systemd[1]: Started docker.service. Feb 9 09:57:57.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:57.962876 env[1749]: time="2024-02-09T09:57:57.962814145Z" level=info msg="API listen on /run/docker.sock" Feb 9 09:57:57.980681 systemd[1]: Reloading. Feb 9 09:57:58.051469 /usr/lib/systemd/system-generators/torcx-generator[1881]: time="2024-02-09T09:57:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:57:58.053044 /usr/lib/systemd/system-generators/torcx-generator[1881]: time="2024-02-09T09:57:58Z" level=info msg="torcx already run" Feb 9 09:57:58.135516 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:57:58.135539 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:57:58.151128 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit: BPF prog-id=35 op=LOAD Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.218000 audit: BPF prog-id=36 op=LOAD Feb 9 09:57:58.218000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:57:58.218000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit: BPF prog-id=37 op=LOAD Feb 9 09:57:58.220000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit: BPF prog-id=38 op=LOAD Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit: BPF prog-id=39 op=LOAD Feb 9 09:57:58.220000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:57:58.220000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit: BPF prog-id=40 op=LOAD Feb 9 09:57:58.220000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit: BPF prog-id=41 op=LOAD Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.221000 audit: BPF prog-id=42 op=LOAD Feb 9 09:57:58.221000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:57:58.221000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.222000 audit: BPF prog-id=43 op=LOAD Feb 9 09:57:58.222000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit: BPF prog-id=44 op=LOAD Feb 9 09:57:58.223000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit: BPF prog-id=45 op=LOAD Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.223000 audit: BPF prog-id=46 op=LOAD Feb 9 09:57:58.223000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:57:58.223000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.224000 audit: BPF prog-id=47 op=LOAD Feb 9 09:57:58.224000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit: BPF prog-id=48 op=LOAD Feb 9 09:57:58.225000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:57:58.226000 audit: BPF prog-id=49 op=LOAD Feb 9 09:57:58.226000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:57:58.234126 systemd[1]: Started kubelet.service. Feb 9 09:57:58.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:58.311501 kubelet[1940]: E0209 09:57:58.308930 1940 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:57:58.313498 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:57:58.313632 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:57:58.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:57:59.407733 env[1396]: time="2024-02-09T09:57:59.407417222Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 9 09:58:00.322286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount235619819.mount: Deactivated successfully. Feb 9 09:58:02.557733 env[1396]: time="2024-02-09T09:58:02.557665451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:02.563453 env[1396]: time="2024-02-09T09:58:02.563398914Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:02.567018 env[1396]: time="2024-02-09T09:58:02.566970184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:02.570999 env[1396]: time="2024-02-09T09:58:02.570956989Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:02.571888 env[1396]: time="2024-02-09T09:58:02.571850737Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 9 09:58:02.582574 env[1396]: time="2024-02-09T09:58:02.582531068Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 9 09:58:04.902921 env[1396]: time="2024-02-09T09:58:04.902859229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:04.910210 env[1396]: time="2024-02-09T09:58:04.910155462Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:04.915450 env[1396]: time="2024-02-09T09:58:04.915403290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:04.921140 env[1396]: time="2024-02-09T09:58:04.921099893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:04.921869 env[1396]: time="2024-02-09T09:58:04.921831253Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 9 09:58:04.931871 env[1396]: time="2024-02-09T09:58:04.931821657Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 9 09:58:06.399277 env[1396]: time="2024-02-09T09:58:06.399225613Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:06.404750 env[1396]: time="2024-02-09T09:58:06.404707204Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:06.409851 env[1396]: time="2024-02-09T09:58:06.409793576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:06.414864 env[1396]: time="2024-02-09T09:58:06.414818671Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:06.415782 env[1396]: time="2024-02-09T09:58:06.415737343Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 9 09:58:06.426002 env[1396]: time="2024-02-09T09:58:06.425962084Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 09:58:07.378858 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1149635361.mount: Deactivated successfully. Feb 9 09:58:08.308205 env[1396]: time="2024-02-09T09:58:08.308140189Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:08.322197 env[1396]: time="2024-02-09T09:58:08.322146531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:08.326949 env[1396]: time="2024-02-09T09:58:08.326907613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:08.331265 env[1396]: time="2024-02-09T09:58:08.331207519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:08.331933 env[1396]: time="2024-02-09T09:58:08.331900644Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 9 09:58:08.343013 env[1396]: time="2024-02-09T09:58:08.342974132Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 09:58:08.427299 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 09:58:08.433516 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 09:58:08.433579 kernel: audit: type=1130 audit(1707472688.426:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.427483 systemd[1]: Stopped kubelet.service. Feb 9 09:58:08.429184 systemd[1]: Started kubelet.service. Feb 9 09:58:08.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.473039 kernel: audit: type=1131 audit(1707472688.426:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.492814 kernel: audit: type=1130 audit(1707472688.428:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:08.529044 kubelet[1978]: E0209 09:58:08.528980 1978 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:58:08.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:58:08.532202 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:58:08.532336 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:58:08.554659 kernel: audit: type=1131 audit(1707472688.532:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:58:08.975925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount181894925.mount: Deactivated successfully. Feb 9 09:58:08.998661 env[1396]: time="2024-02-09T09:58:08.998601198Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:09.008156 env[1396]: time="2024-02-09T09:58:09.008045258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:09.012124 env[1396]: time="2024-02-09T09:58:09.012065903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:09.018250 env[1396]: time="2024-02-09T09:58:09.018199165Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:09.018977 env[1396]: time="2024-02-09T09:58:09.018941969Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 09:58:09.028923 env[1396]: time="2024-02-09T09:58:09.028885047Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 9 09:58:09.988467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount674787804.mount: Deactivated successfully. Feb 9 09:58:13.306832 env[1396]: time="2024-02-09T09:58:13.306768129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:13.314709 env[1396]: time="2024-02-09T09:58:13.314653346Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:13.320792 env[1396]: time="2024-02-09T09:58:13.320748400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:13.325257 env[1396]: time="2024-02-09T09:58:13.325204846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:13.326127 env[1396]: time="2024-02-09T09:58:13.326062128Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 9 09:58:13.335475 env[1396]: time="2024-02-09T09:58:13.335423640Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 09:58:14.053889 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount859998666.mount: Deactivated successfully. Feb 9 09:58:14.525422 env[1396]: time="2024-02-09T09:58:14.525362484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:14.535167 env[1396]: time="2024-02-09T09:58:14.535120230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:14.542103 env[1396]: time="2024-02-09T09:58:14.542044936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:14.548053 env[1396]: time="2024-02-09T09:58:14.547994083Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:14.548775 env[1396]: time="2024-02-09T09:58:14.548741492Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 9 09:58:18.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.677318 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 09:58:18.677498 systemd[1]: Stopped kubelet.service. Feb 9 09:58:18.679511 systemd[1]: Started kubelet.service. Feb 9 09:58:18.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.718609 kernel: audit: type=1130 audit(1707472698.676:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.718722 kernel: audit: type=1131 audit(1707472698.676:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.718746 kernel: audit: type=1130 audit(1707472698.676:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:18.786805 kubelet[2052]: E0209 09:58:18.786733 2052 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 09:58:18.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:58:18.788888 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:58:18.789027 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:58:18.811137 kernel: audit: type=1131 audit(1707472698.788:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:58:19.434670 systemd[1]: Stopped kubelet.service. Feb 9 09:58:19.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:19.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:19.477815 kernel: audit: type=1130 audit(1707472699.433:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:19.477928 kernel: audit: type=1131 audit(1707472699.433:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:19.488164 systemd[1]: Reloading. Feb 9 09:58:19.548046 /usr/lib/systemd/system-generators/torcx-generator[2082]: time="2024-02-09T09:58:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:58:19.548528 /usr/lib/systemd/system-generators/torcx-generator[2082]: time="2024-02-09T09:58:19Z" level=info msg="torcx already run" Feb 9 09:58:19.637199 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:58:19.637222 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:58:19.652797 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.763813 kernel: audit: type=1400 audit(1707472699.719:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.763951 kernel: audit: type=1400 audit(1707472699.719:396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.764018 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791185 kernel: audit: type=1400 audit(1707472699.719:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit: BPF prog-id=50 op=LOAD Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.739000 audit: BPF prog-id=51 op=LOAD Feb 9 09:58:19.739000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:58:19.739000 audit: BPF prog-id=36 op=UNLOAD Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit: BPF prog-id=52 op=LOAD Feb 9 09:58:19.741000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit: BPF prog-id=53 op=LOAD Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit: BPF prog-id=54 op=LOAD Feb 9 09:58:19.742000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:58:19.742000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.762000 audit: BPF prog-id=55 op=LOAD Feb 9 09:58:19.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.791000 audit: BPF prog-id=58 op=LOAD Feb 9 09:58:19.791000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit: BPF prog-id=59 op=LOAD Feb 9 09:58:19.792000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit: BPF prog-id=60 op=LOAD Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.792000 audit: BPF prog-id=61 op=LOAD Feb 9 09:58:19.792000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:58:19.792000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.793000 audit: BPF prog-id=62 op=LOAD Feb 9 09:58:19.793000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.794000 audit: BPF prog-id=63 op=LOAD Feb 9 09:58:19.794000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:19.795000 audit: BPF prog-id=64 op=LOAD Feb 9 09:58:19.795000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:58:19.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:19.809366 systemd[1]: Started kubelet.service. Feb 9 09:58:19.867446 kubelet[2142]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:19.867832 kubelet[2142]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:58:19.867880 kubelet[2142]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:19.868026 kubelet[2142]: I0209 09:58:19.867992 2142 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:58:21.008374 kubelet[2142]: I0209 09:58:21.008337 2142 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 09:58:21.008748 kubelet[2142]: I0209 09:58:21.008734 2142 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:58:21.009039 kubelet[2142]: I0209 09:58:21.009022 2142 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 09:58:21.013231 kubelet[2142]: I0209 09:58:21.013198 2142 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:58:21.014128 kubelet[2142]: E0209 09:58:21.014069 2142 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.33:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.015976 kubelet[2142]: W0209 09:58:21.015950 2142 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:58:21.017103 kubelet[2142]: I0209 09:58:21.017045 2142 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:58:21.017334 kubelet[2142]: I0209 09:58:21.017312 2142 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:58:21.017409 kubelet[2142]: I0209 09:58:21.017392 2142 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:58:21.017509 kubelet[2142]: I0209 09:58:21.017414 2142 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:58:21.017509 kubelet[2142]: I0209 09:58:21.017426 2142 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 09:58:21.017560 kubelet[2142]: I0209 09:58:21.017543 2142 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:21.020230 kubelet[2142]: I0209 09:58:21.020195 2142 kubelet.go:405] "Attempting to sync node with API server" Feb 9 09:58:21.020230 kubelet[2142]: I0209 09:58:21.020233 2142 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:58:21.020378 kubelet[2142]: I0209 09:58:21.020258 2142 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:58:21.020378 kubelet[2142]: I0209 09:58:21.020273 2142 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:58:21.022637 kubelet[2142]: I0209 09:58:21.022616 2142 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:58:21.023040 kubelet[2142]: W0209 09:58:21.023023 2142 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:58:21.023576 kubelet[2142]: I0209 09:58:21.023555 2142 server.go:1168] "Started kubelet" Feb 9 09:58:21.023804 kubelet[2142]: W0209 09:58:21.023763 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ee2552a568&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.023895 kubelet[2142]: E0209 09:58:21.023885 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ee2552a568&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.025848 kubelet[2142]: W0209 09:58:21.025352 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.025848 kubelet[2142]: E0209 09:58:21.025398 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.025848 kubelet[2142]: E0209 09:58:21.025450 2142 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ee2552a568.17b22960002f3874", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ee2552a568", UID:"ci-3510.3.2-a-ee2552a568", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ee2552a568"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 23533172, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 23533172, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.33:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.33:6443: connect: connection refused'(may retry after sleeping) Feb 9 09:58:21.026033 kubelet[2142]: I0209 09:58:21.025621 2142 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:58:21.026033 kubelet[2142]: I0209 09:58:21.026004 2142 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:58:21.025000 audit[2142]: AVC avc: denied { mac_admin } for pid=2142 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:21.025000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:21.025000 audit[2142]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd7a40 a1=4000b2a1c8 a2=4000dd7a10 a3=25 items=0 ppid=1 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.025000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:21.026826 kubelet[2142]: I0209 09:58:21.026807 2142 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:58:21.025000 audit[2142]: AVC avc: denied { mac_admin } for pid=2142 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:21.025000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:21.025000 audit[2142]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000934540 a1=4000b2a1e0 a2=4000dd7ad0 a3=25 items=0 ppid=1 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.025000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:21.027044 kubelet[2142]: I0209 09:58:21.026983 2142 server.go:461] "Adding debug handlers to kubelet server" Feb 9 09:58:21.027125 kubelet[2142]: I0209 09:58:21.027112 2142 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:58:21.027267 kubelet[2142]: I0209 09:58:21.027253 2142 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:58:21.028218 kubelet[2142]: E0209 09:58:21.028186 2142 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:58:21.028288 kubelet[2142]: E0209 09:58:21.028222 2142 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:58:21.030901 kubelet[2142]: I0209 09:58:21.030140 2142 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 09:58:21.030901 kubelet[2142]: I0209 09:58:21.030261 2142 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 09:58:21.030901 kubelet[2142]: W0209 09:58:21.030640 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.030901 kubelet[2142]: E0209 09:58:21.030685 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.031171 kubelet[2142]: E0209 09:58:21.031009 2142 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="200ms" Feb 9 09:58:21.032000 audit[2153]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.032000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=ffffd6a467d0 a2=0 a3=1 items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:58:21.034000 audit[2154]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.034000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=4 a1=fffff3e9cd40 a2=0 a3=1 items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:58:21.038000 audit[2156]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.038000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=4 a1=ffffdfa2f3c0 a2=0 a3=1 items=0 ppid=2142 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:21.040000 audit[2158]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.040000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=4 a1=ffffd68f1f50 a2=0 a3=1 items=0 ppid=2142 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:21.062000 audit[2164]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.062000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=4 a1=ffffd3e16510 a2=0 a3=1 items=0 ppid=2142 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:58:21.064422 kubelet[2142]: I0209 09:58:21.064398 2142 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:58:21.064000 audit[2166]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.064000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffc88f4800 a2=0 a3=1 items=0 ppid=2142 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:58:21.064000 audit[2165]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:21.064000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=ffffdbb61c80 a2=0 a3=1 items=0 ppid=2142 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:58:21.066174 kubelet[2142]: I0209 09:58:21.066154 2142 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:58:21.066283 kubelet[2142]: I0209 09:58:21.066273 2142 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 09:58:21.066355 kubelet[2142]: I0209 09:58:21.066346 2142 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 09:58:21.066463 kubelet[2142]: E0209 09:58:21.066453 2142 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:58:21.066000 audit[2167]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:21.066000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffe8b8a6e0 a2=0 a3=1 items=0 ppid=2142 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:58:21.067000 audit[2168]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.067000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=4 a1=fffff167c0e0 a2=0 a3=1 items=0 ppid=2142 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:58:21.068000 audit[2169]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:21.068000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=4 a1=ffffe7a7b860 a2=0 a3=1 items=0 ppid=2142 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:58:21.069000 audit[2170]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:21.069000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=4 a1=ffffd736e3d0 a2=0 a3=1 items=0 ppid=2142 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:58:21.069000 audit[2171]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:21.069000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=4 a1=ffffc32b5ce0 a2=0 a3=1 items=0 ppid=2142 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:58:21.071520 kubelet[2142]: W0209 09:58:21.071362 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.071520 kubelet[2142]: E0209 09:58:21.071424 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:21.159649 kubelet[2142]: I0209 09:58:21.159345 2142 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.160201 kubelet[2142]: I0209 09:58:21.160176 2142 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:58:21.160201 kubelet[2142]: I0209 09:58:21.160199 2142 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:58:21.160310 kubelet[2142]: I0209 09:58:21.160222 2142 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:21.161688 kubelet[2142]: E0209 09:58:21.161664 2142 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.166639 kubelet[2142]: E0209 09:58:21.166614 2142 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 09:58:21.175471 kubelet[2142]: I0209 09:58:21.175436 2142 policy_none.go:49] "None policy: Start" Feb 9 09:58:21.176384 kubelet[2142]: I0209 09:58:21.176362 2142 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:58:21.176477 kubelet[2142]: I0209 09:58:21.176396 2142 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:58:21.185127 systemd[1]: Created slice kubepods.slice. Feb 9 09:58:21.190298 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:58:21.193434 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:58:21.201027 kubelet[2142]: I0209 09:58:21.201002 2142 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:58:21.200000 audit[2142]: AVC avc: denied { mac_admin } for pid=2142 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:21.200000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:21.200000 audit[2142]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f187e0 a1=4000f29650 a2=4000f187b0 a3=25 items=0 ppid=1 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:21.200000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:21.201526 kubelet[2142]: I0209 09:58:21.201496 2142 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:58:21.202290 kubelet[2142]: I0209 09:58:21.202272 2142 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:58:21.203279 kubelet[2142]: E0209 09:58:21.203260 2142 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-ee2552a568\" not found" Feb 9 09:58:21.232404 kubelet[2142]: E0209 09:58:21.232357 2142 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="400ms" Feb 9 09:58:21.364401 kubelet[2142]: I0209 09:58:21.364296 2142 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.365439 kubelet[2142]: E0209 09:58:21.365415 2142 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.367181 kubelet[2142]: I0209 09:58:21.367158 2142 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:21.368883 kubelet[2142]: I0209 09:58:21.368845 2142 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:21.371209 kubelet[2142]: I0209 09:58:21.371170 2142 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:21.376389 systemd[1]: Created slice kubepods-burstable-pod83f2bba93b7b98d538c5626e87411d14.slice. Feb 9 09:58:21.387689 systemd[1]: Created slice kubepods-burstable-pod9befde9a7ec1b0e894c8e31828902e9e.slice. Feb 9 09:58:21.394552 systemd[1]: Created slice kubepods-burstable-pod6cae8c9d10e7bbb3f1f28fef44a2a6d6.slice. Feb 9 09:58:21.433640 kubelet[2142]: I0209 09:58:21.433598 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.433820 kubelet[2142]: I0209 09:58:21.433808 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.433941 kubelet[2142]: I0209 09:58:21.433929 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434036 kubelet[2142]: I0209 09:58:21.434024 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/83f2bba93b7b98d538c5626e87411d14-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-ee2552a568\" (UID: \"83f2bba93b7b98d538c5626e87411d14\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434197 kubelet[2142]: I0209 09:58:21.434174 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434291 kubelet[2142]: I0209 09:58:21.434282 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434430 kubelet[2142]: I0209 09:58:21.434417 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434556 kubelet[2142]: I0209 09:58:21.434544 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.434680 kubelet[2142]: I0209 09:58:21.434669 2142 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.633531 kubelet[2142]: E0209 09:58:21.633421 2142 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="800ms" Feb 9 09:58:21.685962 env[1396]: time="2024-02-09T09:58:21.685645368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-ee2552a568,Uid:83f2bba93b7b98d538c5626e87411d14,Namespace:kube-system,Attempt:0,}" Feb 9 09:58:21.693953 env[1396]: time="2024-02-09T09:58:21.693901796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-ee2552a568,Uid:9befde9a7ec1b0e894c8e31828902e9e,Namespace:kube-system,Attempt:0,}" Feb 9 09:58:21.697943 env[1396]: time="2024-02-09T09:58:21.697895455Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-ee2552a568,Uid:6cae8c9d10e7bbb3f1f28fef44a2a6d6,Namespace:kube-system,Attempt:0,}" Feb 9 09:58:21.768102 kubelet[2142]: I0209 09:58:21.768061 2142 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:21.768692 kubelet[2142]: E0209 09:58:21.768676 2142 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:22.143754 kubelet[2142]: W0209 09:58:22.143690 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.143754 kubelet[2142]: E0209 09:58:22.143757 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.189363 kubelet[2142]: W0209 09:58:22.189300 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.189363 kubelet[2142]: E0209 09:58:22.189357 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.196708 kubelet[2142]: W0209 09:58:22.196665 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.196708 kubelet[2142]: E0209 09:58:22.196708 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.436454 kubelet[2142]: E0209 09:58:22.436412 2142 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="1.6s" Feb 9 09:58:22.440894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount456653122.mount: Deactivated successfully. Feb 9 09:58:22.467473 env[1396]: time="2024-02-09T09:58:22.467424779Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.488061 env[1396]: time="2024-02-09T09:58:22.488005589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.493453 env[1396]: time="2024-02-09T09:58:22.493387603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.497962 env[1396]: time="2024-02-09T09:58:22.497922686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.510232 env[1396]: time="2024-02-09T09:58:22.510187303Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.516264 env[1396]: time="2024-02-09T09:58:22.516219695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.521167 env[1396]: time="2024-02-09T09:58:22.521124245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.525710 env[1396]: time="2024-02-09T09:58:22.525668449Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.530834 env[1396]: time="2024-02-09T09:58:22.530764473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.536209 env[1396]: time="2024-02-09T09:58:22.536167086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.546274 env[1396]: time="2024-02-09T09:58:22.546229859Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.550485 env[1396]: time="2024-02-09T09:58:22.550445993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:22.571107 kubelet[2142]: I0209 09:58:22.570887 2142 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:22.571414 kubelet[2142]: E0209 09:58:22.571388 2142 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:22.605904 kubelet[2142]: W0209 09:58:22.605842 2142 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ee2552a568&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.605904 kubelet[2142]: E0209 09:58:22.605906 2142 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-ee2552a568&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Feb 9 09:58:22.668054 env[1396]: time="2024-02-09T09:58:22.667935017Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:22.668230 env[1396]: time="2024-02-09T09:58:22.668103571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:22.668230 env[1396]: time="2024-02-09T09:58:22.668136210Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:22.668589 env[1396]: time="2024-02-09T09:58:22.668529276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69 pid=2180 runtime=io.containerd.runc.v2 Feb 9 09:58:22.686447 env[1396]: time="2024-02-09T09:58:22.686336022Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:22.686447 env[1396]: time="2024-02-09T09:58:22.686384820Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:22.686447 env[1396]: time="2024-02-09T09:58:22.686394900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:22.687610 env[1396]: time="2024-02-09T09:58:22.686971840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:22.687610 env[1396]: time="2024-02-09T09:58:22.687012558Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:22.687818 env[1396]: time="2024-02-09T09:58:22.687024278Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:22.688064 env[1396]: time="2024-02-09T09:58:22.688005764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052 pid=2199 runtime=io.containerd.runc.v2 Feb 9 09:58:22.688354 env[1396]: time="2024-02-09T09:58:22.688280875Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e429bc61d29bb35e4942bea34e3fdccebed0e5d916d44d43fe8c9b11131aa4a5 pid=2219 runtime=io.containerd.runc.v2 Feb 9 09:58:22.698844 systemd[1]: Started cri-containerd-92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69.scope. Feb 9 09:58:22.707233 systemd[1]: Started cri-containerd-e429bc61d29bb35e4942bea34e3fdccebed0e5d916d44d43fe8c9b11131aa4a5.scope. Feb 9 09:58:22.723506 systemd[1]: Started cri-containerd-42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052.scope. Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.725000 audit: BPF prog-id=65 op=LOAD Feb 9 09:58:22.725000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.725000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2219 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323962633631643239626233356534393432626561333465336664 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2219 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323962633631643239626233356534393432626561333465336664 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit: BPF prog-id=66 op=LOAD Feb 9 09:58:22.726000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2219 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323962633631643239626233356534393432626561333465336664 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit: BPF prog-id=67 op=LOAD Feb 9 09:58:22.726000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2219 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323962633631643239626233356534393432626561333465336664 Feb 9 09:58:22.726000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:58:22.726000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.726000 audit: BPF prog-id=68 op=LOAD Feb 9 09:58:22.726000 audit[2235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2219 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534323962633631643239626233356534393432626561333465336664 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.737000 audit: BPF prog-id=69 op=LOAD Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353035383533643935663461646365623730666333326361623930 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353035383533643935663461646365623730666333326361623930 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit: BPF prog-id=70 op=LOAD Feb 9 09:58:22.738000 audit[2198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353035383533643935663461646365623730666333326361623930 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit: BPF prog-id=71 op=LOAD Feb 9 09:58:22.738000 audit[2198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353035383533643935663461646365623730666333326361623930 Feb 9 09:58:22.738000 audit: BPF prog-id=71 op=UNLOAD Feb 9 09:58:22.738000 audit: BPF prog-id=70 op=UNLOAD Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { perfmon } for pid=2198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit[2198]: AVC avc: denied { bpf } for pid=2198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.738000 audit: BPF prog-id=72 op=LOAD Feb 9 09:58:22.738000 audit[2198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2180 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932353035383533643935663461646365623730666333326361623930 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.750000 audit: BPF prog-id=73 op=LOAD Feb 9 09:58:22.751000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.751000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2199 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643835663164333234643138633639363966323666386261343365 Feb 9 09:58:22.752000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.752000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2199 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643835663164333234643138633639363966323666386261343365 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit: BPF prog-id=74 op=LOAD Feb 9 09:58:22.753000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2199 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643835663164333234643138633639363966323666386261343365 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit: BPF prog-id=75 op=LOAD Feb 9 09:58:22.753000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2199 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643835663164333234643138633639363966323666386261343365 Feb 9 09:58:22.753000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:58:22.753000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.753000 audit: BPF prog-id=76 op=LOAD Feb 9 09:58:22.753000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2199 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432643835663164333234643138633639363966323666386261343365 Feb 9 09:58:22.762193 env[1396]: time="2024-02-09T09:58:22.762149564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-ee2552a568,Uid:6cae8c9d10e7bbb3f1f28fef44a2a6d6,Namespace:kube-system,Attempt:0,} returns sandbox id \"e429bc61d29bb35e4942bea34e3fdccebed0e5d916d44d43fe8c9b11131aa4a5\"" Feb 9 09:58:22.772443 env[1396]: time="2024-02-09T09:58:22.772399850Z" level=info msg="CreateContainer within sandbox \"e429bc61d29bb35e4942bea34e3fdccebed0e5d916d44d43fe8c9b11131aa4a5\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 09:58:22.782280 env[1396]: time="2024-02-09T09:58:22.782231591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-ee2552a568,Uid:83f2bba93b7b98d538c5626e87411d14,Namespace:kube-system,Attempt:0,} returns sandbox id \"92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69\"" Feb 9 09:58:22.787960 env[1396]: time="2024-02-09T09:58:22.787898315Z" level=info msg="CreateContainer within sandbox \"92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 09:58:22.791767 env[1396]: time="2024-02-09T09:58:22.791710424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-ee2552a568,Uid:9befde9a7ec1b0e894c8e31828902e9e,Namespace:kube-system,Attempt:0,} returns sandbox id \"42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052\"" Feb 9 09:58:22.795327 env[1396]: time="2024-02-09T09:58:22.795286620Z" level=info msg="CreateContainer within sandbox \"42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 09:58:22.875014 env[1396]: time="2024-02-09T09:58:22.874950550Z" level=info msg="CreateContainer within sandbox \"e429bc61d29bb35e4942bea34e3fdccebed0e5d916d44d43fe8c9b11131aa4a5\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d124ad6060ad04f1e7fa07857d7f6933ef325ab7fcb77ff879b7e6b17bf0a1c7\"" Feb 9 09:58:22.875838 env[1396]: time="2024-02-09T09:58:22.875803081Z" level=info msg="StartContainer for \"d124ad6060ad04f1e7fa07857d7f6933ef325ab7fcb77ff879b7e6b17bf0a1c7\"" Feb 9 09:58:22.900018 systemd[1]: Started cri-containerd-d124ad6060ad04f1e7fa07857d7f6933ef325ab7fcb77ff879b7e6b17bf0a1c7.scope. Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.915000 audit: BPF prog-id=77 op=LOAD Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2219 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323461643630363061643034663165376661303738353764376636 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2219 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323461643630363061643034663165376661303738353764376636 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.916000 audit: BPF prog-id=78 op=LOAD Feb 9 09:58:22.916000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2219 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323461643630363061643034663165376661303738353764376636 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.917000 audit: BPF prog-id=79 op=LOAD Feb 9 09:58:22.917000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2219 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323461643630363061643034663165376661303738353764376636 Feb 9 09:58:22.918000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:58:22.918000 audit: BPF prog-id=78 op=UNLOAD Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { perfmon } for pid=2308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit[2308]: AVC avc: denied { bpf } for pid=2308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:22.918000 audit: BPF prog-id=80 op=LOAD Feb 9 09:58:22.918000 audit[2308]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2219 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:22.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323461643630363061643034663165376661303738353764376636 Feb 9 09:58:22.935317 env[1396]: time="2024-02-09T09:58:22.935245388Z" level=info msg="CreateContainer within sandbox \"42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61\"" Feb 9 09:58:22.936060 env[1396]: time="2024-02-09T09:58:22.936027441Z" level=info msg="StartContainer for \"dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61\"" Feb 9 09:58:22.955627 env[1396]: time="2024-02-09T09:58:22.955508809Z" level=info msg="CreateContainer within sandbox \"92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779\"" Feb 9 09:58:22.959697 env[1396]: time="2024-02-09T09:58:22.959654026Z" level=info msg="StartContainer for \"d124ad6060ad04f1e7fa07857d7f6933ef325ab7fcb77ff879b7e6b17bf0a1c7\" returns successfully" Feb 9 09:58:22.960647 env[1396]: time="2024-02-09T09:58:22.960607873Z" level=info msg="StartContainer for \"f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779\"" Feb 9 09:58:22.963011 systemd[1]: Started cri-containerd-dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61.scope. Feb 9 09:58:22.986479 systemd[1]: Started cri-containerd-f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779.scope. Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.002000 audit: BPF prog-id=81 op=LOAD Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2180 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631356535303063323066636163643039313664343662333633313234 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2180 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631356535303063323066636163643039313664343662333633313234 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit: BPF prog-id=82 op=LOAD Feb 9 09:58:23.003000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2180 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631356535303063323066636163643039313664343662333633313234 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit: BPF prog-id=83 op=LOAD Feb 9 09:58:23.003000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2180 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631356535303063323066636163643039313664343662333633313234 Feb 9 09:58:23.003000 audit: BPF prog-id=83 op=UNLOAD Feb 9 09:58:23.003000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { perfmon } for pid=2360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit[2360]: AVC avc: denied { bpf } for pid=2360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.003000 audit: BPF prog-id=84 op=LOAD Feb 9 09:58:23.003000 audit[2360]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2180 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631356535303063323066636163643039313664343662333633313234 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit: BPF prog-id=85 op=LOAD Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2199 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653730663634373962653663343137336134653136353834303438 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2199 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653730663634373962653663343137336134653136353834303438 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.012000 audit: BPF prog-id=86 op=LOAD Feb 9 09:58:23.012000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2199 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653730663634373962653663343137336134653136353834303438 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit: BPF prog-id=87 op=LOAD Feb 9 09:58:23.013000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2199 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653730663634373962653663343137336134653136353834303438 Feb 9 09:58:23.013000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:58:23.013000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { perfmon } for pid=2338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit[2338]: AVC avc: denied { bpf } for pid=2338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:23.013000 audit: BPF prog-id=88 op=LOAD Feb 9 09:58:23.013000 audit[2338]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2199 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:23.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466653730663634373962653663343137336134653136353834303438 Feb 9 09:58:23.038938 env[1396]: time="2024-02-09T09:58:23.038871283Z" level=info msg="StartContainer for \"f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779\" returns successfully" Feb 9 09:58:23.071041 env[1396]: time="2024-02-09T09:58:23.070991482Z" level=info msg="StartContainer for \"dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61\" returns successfully" Feb 9 09:58:24.173187 kubelet[2142]: I0209 09:58:24.173143 2142 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:25.241000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.248551 kernel: kauditd_printk_skb: 603 callbacks suppressed Feb 9 09:58:25.248645 kernel: audit: type=1400 audit(1707472705.241:669): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.262000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.310281 kernel: audit: type=1400 audit(1707472705.262:670): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.262000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40025295c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.355959 kernel: audit: type=1300 audit(1707472705.262:670): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40025295c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.386254 kernel: audit: type=1327 audit(1707472705.262:670): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.241000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c73350 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.419636 kernel: audit: type=1300 audit(1707472705.241:669): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c73350 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.241000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.451724 kernel: audit: type=1327 audit(1707472705.241:669): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.276000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.481845 kernel: audit: type=1400 audit(1707472705.276:671): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.276000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c734a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.517948 kernel: audit: type=1300 audit(1707472705.276:671): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004c734a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.555205 kernel: audit: type=1327 audit(1707472705.276:671): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.581997 kernel: audit: type=1400 audit(1707472705.524:672): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4005209d60 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40096dad80 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=82 a1=40096daf00 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:58:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:58:25.801972 kubelet[2142]: E0209 09:58:25.801870 2142 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-ee2552a568\" not found" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:25.807783 kubelet[2142]: I0209 09:58:25.807748 2142 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:25.862393 kubelet[2142]: E0209 09:58:25.862297 2142 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ee2552a568.17b22960002f3874", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ee2552a568", UID:"ci-3510.3.2-a-ee2552a568", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ee2552a568"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 23533172, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 23533172, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:58:25.936120 kubelet[2142]: E0209 09:58:25.936003 2142 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ee2552a568.17b2296000769057", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ee2552a568", UID:"ci-3510.3.2-a-ee2552a568", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ee2552a568"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 28208727, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 28208727, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:58:26.027890 kubelet[2142]: I0209 09:58:26.027852 2142 apiserver.go:52] "Watching apiserver" Feb 9 09:58:26.052504 kubelet[2142]: E0209 09:58:26.052340 2142 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-ee2552a568.17b229600843cbec", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-ee2552a568", UID:"ci-3510.3.2-a-ee2552a568", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510.3.2-a-ee2552a568 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ee2552a568"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 159099372, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 21, 159099372, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 9 09:58:26.130909 kubelet[2142]: I0209 09:58:26.130868 2142 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 09:58:26.188173 kubelet[2142]: I0209 09:58:26.188137 2142 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:58:26.541000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:26.541000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001028000 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:26.541000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:26.541000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:26.541000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000322520 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:26.541000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:30.421693 systemd[1]: Reloading. Feb 9 09:58:30.482695 /usr/lib/systemd/system-generators/torcx-generator[2434]: time="2024-02-09T09:58:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:58:30.483120 /usr/lib/systemd/system-generators/torcx-generator[2434]: time="2024-02-09T09:58:30Z" level=info msg="torcx already run" Feb 9 09:58:30.625698 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:58:30.625719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:58:30.641585 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:58:30.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.728914 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 09:58:30.729030 kernel: audit: type=1400 audit(1707472710.721:677): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.773788 kernel: audit: type=1400 audit(1707472710.750:678): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.798594 kernel: audit: type=1400 audit(1707472710.750:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.827463 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:58:30.827603 kernel: audit: type=1400 audit(1707472710.750:680): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.827641 kernel: audit: audit_lost=23 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.860136 kernel: audit: backlog limit exceeded Feb 9 09:58:30.860272 kernel: audit: type=1400 audit(1707472710.750:681): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.860306 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:58:30.873374 kernel: audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit: BPF prog-id=89 op=LOAD Feb 9 09:58:30.750000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit: BPF prog-id=90 op=LOAD Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.772000 audit: BPF prog-id=91 op=LOAD Feb 9 09:58:30.772000 audit: BPF prog-id=50 op=UNLOAD Feb 9 09:58:30.772000 audit: BPF prog-id=51 op=UNLOAD Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit: BPF prog-id=92 op=LOAD Feb 9 09:58:30.797000 audit: BPF prog-id=52 op=UNLOAD Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit: BPF prog-id=93 op=LOAD Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.797000 audit: BPF prog-id=94 op=LOAD Feb 9 09:58:30.797000 audit: BPF prog-id=53 op=UNLOAD Feb 9 09:58:30.797000 audit: BPF prog-id=54 op=UNLOAD Feb 9 09:58:30.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:30.896731 systemd[1]: Stopping kubelet.service... Feb 9 09:58:30.922550 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 09:58:30.922765 systemd[1]: Stopped kubelet.service. Feb 9 09:58:30.922825 systemd[1]: kubelet.service: Consumed 1.569s CPU time. Feb 9 09:58:30.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:30.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:30.925486 systemd[1]: Started kubelet.service. Feb 9 09:58:30.942000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 09:58:30.942000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000699580 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:30.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:31.006721 kubelet[2492]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:31.007529 kubelet[2492]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:58:31.007683 kubelet[2492]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:31.008006 kubelet[2492]: I0209 09:58:31.007894 2492 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:58:31.015564 kubelet[2492]: I0209 09:58:31.015529 2492 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 09:58:31.019842 kubelet[2492]: I0209 09:58:31.019641 2492 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:58:31.020175 kubelet[2492]: I0209 09:58:31.020154 2492 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 09:58:31.022033 kubelet[2492]: I0209 09:58:31.022000 2492 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 09:58:31.023055 kubelet[2492]: I0209 09:58:31.023035 2492 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:58:31.025550 kubelet[2492]: W0209 09:58:31.025525 2492 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:58:31.026252 kubelet[2492]: I0209 09:58:31.026235 2492 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:58:31.026459 kubelet[2492]: I0209 09:58:31.026447 2492 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:58:31.026530 kubelet[2492]: I0209 09:58:31.026515 2492 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 09:58:31.026600 kubelet[2492]: I0209 09:58:31.026538 2492 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 09:58:31.026600 kubelet[2492]: I0209 09:58:31.026554 2492 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 09:58:31.026600 kubelet[2492]: I0209 09:58:31.026585 2492 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:31.039972 kubelet[2492]: I0209 09:58:31.039934 2492 kubelet.go:405] "Attempting to sync node with API server" Feb 9 09:58:31.039972 kubelet[2492]: I0209 09:58:31.039968 2492 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:58:31.040181 kubelet[2492]: I0209 09:58:31.039995 2492 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:58:31.040181 kubelet[2492]: I0209 09:58:31.040010 2492 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:58:31.047365 kubelet[2492]: I0209 09:58:31.047337 2492 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:58:31.048054 kubelet[2492]: I0209 09:58:31.048035 2492 server.go:1168] "Started kubelet" Feb 9 09:58:31.048000 audit[2492]: AVC avc: denied { mac_admin } for pid=2492 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:31.048000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:31.048000 audit[2492]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d58480 a1=4000d54408 a2=4000d58450 a3=25 items=0 ppid=1 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:31.048000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:31.050344 kubelet[2492]: I0209 09:58:31.050324 2492 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:58:31.049000 audit[2492]: AVC avc: denied { mac_admin } for pid=2492 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:31.049000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:31.049000 audit[2492]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c6f340 a1=4000d54420 a2=4000d58510 a3=25 items=0 ppid=1 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:31.049000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:31.050654 kubelet[2492]: I0209 09:58:31.050641 2492 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:58:31.050736 kubelet[2492]: I0209 09:58:31.050727 2492 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:58:31.054180 kubelet[2492]: I0209 09:58:31.054143 2492 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:58:31.054795 kubelet[2492]: I0209 09:58:31.054770 2492 server.go:461] "Adding debug handlers to kubelet server" Feb 9 09:58:31.060222 kubelet[2492]: I0209 09:58:31.055805 2492 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:58:31.060222 kubelet[2492]: I0209 09:58:31.056832 2492 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 09:58:31.060222 kubelet[2492]: I0209 09:58:31.056928 2492 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 09:58:31.066850 kubelet[2492]: E0209 09:58:31.066820 2492 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:58:31.067006 kubelet[2492]: E0209 09:58:31.066996 2492 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:58:31.160451 kubelet[2492]: I0209 09:58:31.160420 2492 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.173551 kubelet[2492]: I0209 09:58:31.173506 2492 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 09:58:31.178741 kubelet[2492]: I0209 09:58:31.178701 2492 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 09:58:31.178741 kubelet[2492]: I0209 09:58:31.178738 2492 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 09:58:31.178913 kubelet[2492]: I0209 09:58:31.178761 2492 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 09:58:31.178913 kubelet[2492]: E0209 09:58:31.178814 2492 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:58:31.194218 kubelet[2492]: I0209 09:58:31.194178 2492 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.194338 kubelet[2492]: I0209 09:58:31.194262 2492 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.229653 kubelet[2492]: I0209 09:58:31.229617 2492 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:58:31.229653 kubelet[2492]: I0209 09:58:31.229645 2492 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:58:31.229827 kubelet[2492]: I0209 09:58:31.229669 2492 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:31.229827 kubelet[2492]: I0209 09:58:31.229822 2492 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 09:58:31.229871 kubelet[2492]: I0209 09:58:31.229834 2492 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 09:58:31.229871 kubelet[2492]: I0209 09:58:31.229841 2492 policy_none.go:49] "None policy: Start" Feb 9 09:58:31.231735 kubelet[2492]: I0209 09:58:31.231696 2492 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:58:31.231735 kubelet[2492]: I0209 09:58:31.231737 2492 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:58:31.231967 kubelet[2492]: I0209 09:58:31.231944 2492 state_mem.go:75] "Updated machine memory state" Feb 9 09:58:31.236255 kubelet[2492]: I0209 09:58:31.236222 2492 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:58:31.236399 kubelet[2492]: I0209 09:58:31.236315 2492 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:58:31.235000 audit[2492]: AVC avc: denied { mac_admin } for pid=2492 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:31.235000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:31.235000 audit[2492]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40012c8060 a1=40012689d8 a2=40012c8030 a3=25 items=0 ppid=1 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:31.235000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:31.237807 kubelet[2492]: I0209 09:58:31.237785 2492 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:58:31.279302 kubelet[2492]: I0209 09:58:31.279175 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:31.280624 kubelet[2492]: I0209 09:58:31.280583 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:31.280756 kubelet[2492]: I0209 09:58:31.280675 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:31.291853 kubelet[2492]: W0209 09:58:31.291798 2492 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:58:31.295269 kubelet[2492]: W0209 09:58:31.295236 2492 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:58:31.295658 kubelet[2492]: W0209 09:58:31.295638 2492 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:58:31.463545 kubelet[2492]: I0209 09:58:31.463481 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463690 kubelet[2492]: I0209 09:58:31.463563 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463690 kubelet[2492]: I0209 09:58:31.463591 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463690 kubelet[2492]: I0209 09:58:31.463611 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463690 kubelet[2492]: I0209 09:58:31.463655 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463690 kubelet[2492]: I0209 09:58:31.463681 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9befde9a7ec1b0e894c8e31828902e9e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-ee2552a568\" (UID: \"9befde9a7ec1b0e894c8e31828902e9e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463856 kubelet[2492]: I0209 09:58:31.463714 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/83f2bba93b7b98d538c5626e87411d14-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-ee2552a568\" (UID: \"83f2bba93b7b98d538c5626e87411d14\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463856 kubelet[2492]: I0209 09:58:31.463737 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:31.463856 kubelet[2492]: I0209 09:58:31.463772 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6cae8c9d10e7bbb3f1f28fef44a2a6d6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" (UID: \"6cae8c9d10e7bbb3f1f28fef44a2a6d6\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:32.041059 kubelet[2492]: I0209 09:58:32.041016 2492 apiserver.go:52] "Watching apiserver" Feb 9 09:58:32.157234 kubelet[2492]: I0209 09:58:32.157181 2492 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 09:58:32.168164 kubelet[2492]: I0209 09:58:32.168127 2492 reconciler.go:41] "Reconciler: start to sync state" Feb 9 09:58:32.171909 kubelet[2492]: I0209 09:58:32.171871 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-ee2552a568" podStartSLOduration=1.1718174399999999 podCreationTimestamp="2024-02-09 09:58:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:58:32.141534219 +0000 UTC m=+1.212164093" watchObservedRunningTime="2024-02-09 09:58:32.17181744 +0000 UTC m=+1.242447314" Feb 9 09:58:32.234849 kubelet[2492]: I0209 09:58:32.234801 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" podStartSLOduration=1.234760136 podCreationTimestamp="2024-02-09 09:58:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:58:32.173339719 +0000 UTC m=+1.243969553" watchObservedRunningTime="2024-02-09 09:58:32.234760136 +0000 UTC m=+1.305390010" Feb 9 09:58:32.251296 kubelet[2492]: W0209 09:58:32.251265 2492 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 9 09:58:32.251540 kubelet[2492]: E0209 09:58:32.251522 2492 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-ee2552a568\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" Feb 9 09:58:32.317703 kubelet[2492]: I0209 09:58:32.317588 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-ee2552a568" podStartSLOduration=1.317545175 podCreationTimestamp="2024-02-09 09:58:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:58:32.235855546 +0000 UTC m=+1.306485420" watchObservedRunningTime="2024-02-09 09:58:32.317545175 +0000 UTC m=+1.388175049" Feb 9 09:58:36.915430 sudo[1733]: pam_unix(sudo:session): session closed for user root Feb 9 09:58:36.914000 audit[1733]: USER_END pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:36.921430 kernel: kauditd_printk_skb: 593 callbacks suppressed Feb 9 09:58:36.921538 kernel: audit: type=1106 audit(1707472716.914:756): pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:36.914000 audit[1733]: CRED_DISP pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:36.968722 kernel: audit: type=1104 audit(1707472716.914:757): pid=1733 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:37.004317 sshd[1730]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:37.005000 audit[1730]: USER_END pid=1730 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:37.005000 audit[1730]: CRED_DISP pid=1730 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:37.036603 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:58:37.036831 systemd[1]: session-9.scope: Consumed 6.320s CPU time. Feb 9 09:58:37.037908 systemd[1]: sshd@6-10.200.20.33:22-10.200.12.6:40006.service: Deactivated successfully. Feb 9 09:58:37.059543 kernel: audit: type=1106 audit(1707472717.005:758): pid=1730 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:37.059657 kernel: audit: type=1104 audit(1707472717.005:759): pid=1730 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:37.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.12.6:40006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:37.085378 kernel: audit: type=1131 audit(1707472717.038:760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.12.6:40006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:37.085465 systemd-logind[1374]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:58:37.086414 systemd-logind[1374]: Removed session 9. Feb 9 09:58:44.804000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.804000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120cce0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:44.866131 kernel: audit: type=1400 audit(1707472724.804:761): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.866284 kernel: audit: type=1300 audit(1707472724.804:761): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120cce0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:44.804000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:44.900041 kernel: audit: type=1327 audit(1707472724.804:761): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:44.808000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.925539 kernel: audit: type=1400 audit(1707472724.808:762): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.808000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120ce20 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:44.962999 kernel: audit: type=1300 audit(1707472724.808:762): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120ce20 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:44.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:44.994763 kernel: audit: type=1327 audit(1707472724.808:762): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:44.808000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:45.020934 kernel: audit: type=1400 audit(1707472724.808:763): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.808000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120cf60 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:45.055978 kernel: audit: type=1300 audit(1707472724.808:763): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120cf60 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:45.057193 kubelet[2492]: I0209 09:58:45.057098 2492 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 09:58:44.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:45.058239 env[1396]: time="2024-02-09T09:58:45.058140466Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:58:45.094592 kernel: audit: type=1327 audit(1707472724.808:763): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:45.095024 kubelet[2492]: I0209 09:58:45.094985 2492 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 09:58:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:45.122592 kernel: audit: type=1400 audit(1707472724.809:764): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:58:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012d29a0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:58:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:58:45.242053 kubelet[2492]: I0209 09:58:45.242011 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:45.247395 systemd[1]: Created slice kubepods-besteffort-pod12ecf009_fc22_4dec_a7e6_d672a025ffaf.slice. Feb 9 09:58:45.274404 kubelet[2492]: W0209 09:58:45.274328 2492 reflector.go:533] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 09:58:45.274620 kubelet[2492]: E0209 09:58:45.274604 2492 reflector.go:148] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 09:58:45.275157 kubelet[2492]: W0209 09:58:45.275135 2492 reflector.go:533] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 09:58:45.275330 kubelet[2492]: E0209 09:58:45.275316 2492 reflector.go:148] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 09:58:45.295617 kubelet[2492]: I0209 09:58:45.295575 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-proxy\") pod \"kube-proxy-lnvkh\" (UID: \"12ecf009-fc22-4dec-a7e6-d672a025ffaf\") " pod="kube-system/kube-proxy-lnvkh" Feb 9 09:58:45.295820 kubelet[2492]: I0209 09:58:45.295807 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/12ecf009-fc22-4dec-a7e6-d672a025ffaf-lib-modules\") pod \"kube-proxy-lnvkh\" (UID: \"12ecf009-fc22-4dec-a7e6-d672a025ffaf\") " pod="kube-system/kube-proxy-lnvkh" Feb 9 09:58:45.295929 kubelet[2492]: I0209 09:58:45.295919 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/12ecf009-fc22-4dec-a7e6-d672a025ffaf-xtables-lock\") pod \"kube-proxy-lnvkh\" (UID: \"12ecf009-fc22-4dec-a7e6-d672a025ffaf\") " pod="kube-system/kube-proxy-lnvkh" Feb 9 09:58:45.296022 kubelet[2492]: I0209 09:58:45.296013 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7g9sn\" (UniqueName: \"kubernetes.io/projected/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-api-access-7g9sn\") pod \"kube-proxy-lnvkh\" (UID: \"12ecf009-fc22-4dec-a7e6-d672a025ffaf\") " pod="kube-system/kube-proxy-lnvkh" Feb 9 09:58:45.308759 kubelet[2492]: I0209 09:58:45.308644 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:45.314164 systemd[1]: Created slice kubepods-besteffort-pode4c7b6e0_a38f_4313_95fc_06d91d17fd89.slice. Feb 9 09:58:45.397143 kubelet[2492]: I0209 09:58:45.397106 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8fb7q\" (UniqueName: \"kubernetes.io/projected/e4c7b6e0-a38f-4313-95fc-06d91d17fd89-kube-api-access-8fb7q\") pod \"tigera-operator-7ff8dc855-79grx\" (UID: \"e4c7b6e0-a38f-4313-95fc-06d91d17fd89\") " pod="tigera-operator/tigera-operator-7ff8dc855-79grx" Feb 9 09:58:45.397317 kubelet[2492]: I0209 09:58:45.397166 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e4c7b6e0-a38f-4313-95fc-06d91d17fd89-var-lib-calico\") pod \"tigera-operator-7ff8dc855-79grx\" (UID: \"e4c7b6e0-a38f-4313-95fc-06d91d17fd89\") " pod="tigera-operator/tigera-operator-7ff8dc855-79grx" Feb 9 09:58:45.617780 env[1396]: time="2024-02-09T09:58:45.617655697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-79grx,Uid:e4c7b6e0-a38f-4313-95fc-06d91d17fd89,Namespace:tigera-operator,Attempt:0,}" Feb 9 09:58:45.671777 env[1396]: time="2024-02-09T09:58:45.671585561Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:45.671777 env[1396]: time="2024-02-09T09:58:45.671627080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:45.671777 env[1396]: time="2024-02-09T09:58:45.671637960Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:45.672133 env[1396]: time="2024-02-09T09:58:45.672024392Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110 pid=2572 runtime=io.containerd.runc.v2 Feb 9 09:58:45.688563 systemd[1]: Started cri-containerd-7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110.scope. Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.704000 audit: BPF prog-id=110 op=LOAD Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333364653433346466613163643165333765393464303566333037 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333364653433346466613163643165333765393464303566333037 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.705000 audit: BPF prog-id=111 op=LOAD Feb 9 09:58:45.705000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:45.705000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333364653433346466613163643165333765393464303566333037 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.706000 audit: BPF prog-id=112 op=LOAD Feb 9 09:58:45.706000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:45.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333364653433346466613163643165333765393464303566333037 Feb 9 09:58:45.707000 audit: BPF prog-id=112 op=UNLOAD Feb 9 09:58:45.707000 audit: BPF prog-id=111 op=UNLOAD Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:45.707000 audit: BPF prog-id=113 op=LOAD Feb 9 09:58:45.707000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763333364653433346466613163643165333765393464303566333037 Feb 9 09:58:45.728322 env[1396]: time="2024-02-09T09:58:45.728270249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-79grx,Uid:e4c7b6e0-a38f-4313-95fc-06d91d17fd89,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110\"" Feb 9 09:58:45.729985 env[1396]: time="2024-02-09T09:58:45.729919176Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 09:58:46.398239 kubelet[2492]: E0209 09:58:46.398192 2492 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:58:46.398919 kubelet[2492]: E0209 09:58:46.398289 2492 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-proxy podName:12ecf009-fc22-4dec-a7e6-d672a025ffaf nodeName:}" failed. No retries permitted until 2024-02-09 09:58:46.89826068 +0000 UTC m=+15.968890554 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-proxy") pod "kube-proxy-lnvkh" (UID: "12ecf009-fc22-4dec-a7e6-d672a025ffaf") : failed to sync configmap cache: timed out waiting for the condition Feb 9 09:58:46.405613 kubelet[2492]: E0209 09:58:46.405584 2492 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:58:46.405755 kubelet[2492]: E0209 09:58:46.405743 2492 projected.go:198] Error preparing data for projected volume kube-api-access-7g9sn for pod kube-system/kube-proxy-lnvkh: failed to sync configmap cache: timed out waiting for the condition Feb 9 09:58:46.405864 kubelet[2492]: E0209 09:58:46.405854 2492 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-api-access-7g9sn podName:12ecf009-fc22-4dec-a7e6-d672a025ffaf nodeName:}" failed. No retries permitted until 2024-02-09 09:58:46.905835409 +0000 UTC m=+15.976465283 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-7g9sn" (UniqueName: "kubernetes.io/projected/12ecf009-fc22-4dec-a7e6-d672a025ffaf-kube-api-access-7g9sn") pod "kube-proxy-lnvkh" (UID: "12ecf009-fc22-4dec-a7e6-d672a025ffaf") : failed to sync configmap cache: timed out waiting for the condition Feb 9 09:58:47.055425 env[1396]: time="2024-02-09T09:58:47.055365859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lnvkh,Uid:12ecf009-fc22-4dec-a7e6-d672a025ffaf,Namespace:kube-system,Attempt:0,}" Feb 9 09:58:47.120715 env[1396]: time="2024-02-09T09:58:47.120631586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:47.122040 env[1396]: time="2024-02-09T09:58:47.120676105Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:47.122040 env[1396]: time="2024-02-09T09:58:47.120705264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:47.122040 env[1396]: time="2024-02-09T09:58:47.121216054Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75bebe907e1f18e6925288354c3192210b6c992100998142fe7490460a1c5750 pid=2614 runtime=io.containerd.runc.v2 Feb 9 09:58:47.135799 systemd[1]: Started cri-containerd-75bebe907e1f18e6925288354c3192210b6c992100998142fe7490460a1c5750.scope. Feb 9 09:58:47.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit: BPF prog-id=114 op=LOAD Feb 9 09:58:47.151000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.151000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2614 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626562653930376531663138653639323532383833353463333139 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2614 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626562653930376531663138653639323532383833353463333139 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.152000 audit: BPF prog-id=115 op=LOAD Feb 9 09:58:47.152000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2614 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626562653930376531663138653639323532383833353463333139 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit: BPF prog-id=116 op=LOAD Feb 9 09:58:47.153000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2614 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626562653930376531663138653639323532383833353463333139 Feb 9 09:58:47.153000 audit: BPF prog-id=116 op=UNLOAD Feb 9 09:58:47.153000 audit: BPF prog-id=115 op=UNLOAD Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.153000 audit: BPF prog-id=117 op=LOAD Feb 9 09:58:47.153000 audit[2623]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2614 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626562653930376531663138653639323532383833353463333139 Feb 9 09:58:47.168668 env[1396]: time="2024-02-09T09:58:47.168621290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lnvkh,Uid:12ecf009-fc22-4dec-a7e6-d672a025ffaf,Namespace:kube-system,Attempt:0,} returns sandbox id \"75bebe907e1f18e6925288354c3192210b6c992100998142fe7490460a1c5750\"" Feb 9 09:58:47.172687 env[1396]: time="2024-02-09T09:58:47.172533413Z" level=info msg="CreateContainer within sandbox \"75bebe907e1f18e6925288354c3192210b6c992100998142fe7490460a1c5750\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:58:47.322896 env[1396]: time="2024-02-09T09:58:47.322783243Z" level=info msg="CreateContainer within sandbox \"75bebe907e1f18e6925288354c3192210b6c992100998142fe7490460a1c5750\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5272084cc3827661746bce6f2c039289097f05640308e93b9033aa7e56806e77\"" Feb 9 09:58:47.325880 env[1396]: time="2024-02-09T09:58:47.325841743Z" level=info msg="StartContainer for \"5272084cc3827661746bce6f2c039289097f05640308e93b9033aa7e56806e77\"" Feb 9 09:58:47.351574 systemd[1]: Started cri-containerd-5272084cc3827661746bce6f2c039289097f05640308e93b9033aa7e56806e77.scope. Feb 9 09:58:47.367000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.367000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2614 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373230383463633338323736363137343662636536663263303339 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit: BPF prog-id=118 op=LOAD Feb 9 09:58:47.368000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2614 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373230383463633338323736363137343662636536663263303339 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit: BPF prog-id=119 op=LOAD Feb 9 09:58:47.368000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2614 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373230383463633338323736363137343662636536663263303339 Feb 9 09:58:47.368000 audit: BPF prog-id=119 op=UNLOAD Feb 9 09:58:47.368000 audit: BPF prog-id=118 op=UNLOAD Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:47.368000 audit: BPF prog-id=120 op=LOAD Feb 9 09:58:47.368000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2614 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532373230383463633338323736363137343662636536663263303339 Feb 9 09:58:47.436499 env[1396]: time="2024-02-09T09:58:47.436448026Z" level=info msg="StartContainer for \"5272084cc3827661746bce6f2c039289097f05640308e93b9033aa7e56806e77\" returns successfully" Feb 9 09:58:47.463000 audit[2702]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.463000 audit[2702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeab4a1a0 a2=0 a3=ffffa5d946c0 items=0 ppid=2664 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:58:47.465000 audit[2703]: NETFILTER_CFG table=mangle:43 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.465000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed7aca10 a2=0 a3=ffffa291a6c0 items=0 ppid=2664 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:58:47.468000 audit[2704]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.468000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffce77520 a2=0 a3=ffffaad2b6c0 items=0 ppid=2664 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.468000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:58:47.472000 audit[2705]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.472000 audit[2705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd26c920 a2=0 a3=ffffbb4496c0 items=0 ppid=2664 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:58:47.473000 audit[2706]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.473000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa310740 a2=0 a3=ffffa5ca26c0 items=0 ppid=2664 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.473000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:58:47.474000 audit[2707]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.474000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd18214d0 a2=0 a3=ffff9bb056c0 items=0 ppid=2664 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:58:47.566000 audit[2708]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.566000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcec46530 a2=0 a3=ffffbc1106c0 items=0 ppid=2664 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:58:47.569000 audit[2710]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.569000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc81d9360 a2=0 a3=ffffb1d446c0 items=0 ppid=2664 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:58:47.574000 audit[2713]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.574000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe9409740 a2=0 a3=ffffb073e6c0 items=0 ppid=2664 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:58:47.577000 audit[2714]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.577000 audit[2714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe665f10 a2=0 a3=ffffaa7a46c0 items=0 ppid=2664 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:58:47.580000 audit[2716]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.580000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff4476d10 a2=0 a3=ffff8ed376c0 items=0 ppid=2664 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:58:47.582000 audit[2717]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.582000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3742d30 a2=0 a3=ffff8948e6c0 items=0 ppid=2664 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:58:47.585000 audit[2719]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.585000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcd5d3540 a2=0 a3=ffff8ad6c6c0 items=0 ppid=2664 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.585000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:58:47.591000 audit[2722]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.591000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd299e950 a2=0 a3=ffffb1f536c0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:58:47.592000 audit[2723]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.592000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd73a62b0 a2=0 a3=ffffb5d946c0 items=0 ppid=2664 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:58:47.594000 audit[2725]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.594000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd5767580 a2=0 a3=ffff8f2bc6c0 items=0 ppid=2664 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:58:47.595000 audit[2726]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.595000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef3df450 a2=0 a3=ffff8b32d6c0 items=0 ppid=2664 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:58:47.598000 audit[2728]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.598000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf8b1490 a2=0 a3=ffffb8a976c0 items=0 ppid=2664 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:58:47.606000 audit[2731]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.606000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8e99c90 a2=0 a3=ffff86a6f6c0 items=0 ppid=2664 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:58:47.611000 audit[2734]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.611000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf749e10 a2=0 a3=ffff9b50b6c0 items=0 ppid=2664 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:58:47.612000 audit[2735]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.612000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffec376880 a2=0 a3=ffffbe2176c0 items=0 ppid=2664 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:58:47.615000 audit[2737]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.615000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff61659d0 a2=0 a3=ffff958b76c0 items=0 ppid=2664 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:58:47.619000 audit[2740]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.619000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd20efea0 a2=0 a3=ffff9fa796c0 items=0 ppid=2664 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:58:47.625000 audit[2745]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.625000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9b2e820 a2=0 a3=ffff837376c0 items=0 ppid=2664 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:58:47.627000 audit[2747]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:47.627000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe4ffd720 a2=0 a3=ffffb6b676c0 items=0 ppid=2664 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:58:47.668000 audit[2749]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:47.668000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc4b310d0 a2=0 a3=ffff99af46c0 items=0 ppid=2664 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:47.690000 audit[2749]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:47.690000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc4b310d0 a2=0 a3=ffff99af46c0 items=0 ppid=2664 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:47.692000 audit[2754]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.692000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdb2dbc50 a2=0 a3=ffffb18c46c0 items=0 ppid=2664 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:58:47.695000 audit[2756]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.695000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff1d0c4d0 a2=0 a3=ffff9cf7a6c0 items=0 ppid=2664 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:58:47.698000 audit[2759]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.698000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdbe39230 a2=0 a3=ffffa34886c0 items=0 ppid=2664 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:58:47.700000 audit[2760]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.700000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc59a7810 a2=0 a3=ffff8c0c26c0 items=0 ppid=2664 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:58:47.703000 audit[2762]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.703000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdbdd86d0 a2=0 a3=ffff86f836c0 items=0 ppid=2664 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:58:47.704000 audit[2763]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.704000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf6cca70 a2=0 a3=ffff878f36c0 items=0 ppid=2664 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:58:47.707000 audit[2765]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.707000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe24937c0 a2=0 a3=ffffab53c6c0 items=0 ppid=2664 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:58:47.711000 audit[2768]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.711000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc1e0ca60 a2=0 a3=ffffab9cb6c0 items=0 ppid=2664 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:58:47.712000 audit[2769]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.712000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb20a310 a2=0 a3=ffff8d4146c0 items=0 ppid=2664 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:58:47.715000 audit[2771]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.715000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8f96e90 a2=0 a3=ffff86fb26c0 items=0 ppid=2664 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:58:47.716000 audit[2772]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.716000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde689790 a2=0 a3=ffff91f396c0 items=0 ppid=2664 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:58:47.719000 audit[2774]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.719000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4b242d0 a2=0 a3=ffff946bc6c0 items=0 ppid=2664 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:58:47.725000 audit[2777]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.725000 audit[2777]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3ff5160 a2=0 a3=ffffb766e6c0 items=0 ppid=2664 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:58:47.730000 audit[2780]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.730000 audit[2780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff2f23d30 a2=0 a3=ffffa50496c0 items=0 ppid=2664 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:58:47.732000 audit[2781]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.732000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd24b1f00 a2=0 a3=ffffa997c6c0 items=0 ppid=2664 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:58:47.734000 audit[2783]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.734000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe7bcd210 a2=0 a3=ffffa142d6c0 items=0 ppid=2664 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:58:47.737000 audit[2786]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.737000 audit[2786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc74287a0 a2=0 a3=ffff98bfa6c0 items=0 ppid=2664 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:58:47.738000 audit[2787]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.738000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec437d50 a2=0 a3=ffff920a36c0 items=0 ppid=2664 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:58:47.741000 audit[2789]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.741000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6baba00 a2=0 a3=ffffacfdc6c0 items=0 ppid=2664 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:47.744000 audit[2792]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.744000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffefb85230 a2=0 a3=ffff9bfe06c0 items=0 ppid=2664 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:47.745000 audit[2793]: NETFILTER_CFG table=nat:89 family=10 entries=1 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.745000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf6cb9b0 a2=0 a3=ffffa018b6c0 items=0 ppid=2664 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.745000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:58:47.748000 audit[2795]: NETFILTER_CFG table=nat:90 family=10 entries=2 op=nft_register_chain pid=2795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:47.748000 audit[2795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdee0fda0 a2=0 a3=ffff92c846c0 items=0 ppid=2664 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.748000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:58:47.751000 audit[2797]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:58:47.751000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc66c8f80 a2=0 a3=ffff80e376c0 items=0 ppid=2664 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.751000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:47.752000 audit[2797]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:58:47.752000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffc66c8f80 a2=0 a3=ffff80e376c0 items=0 ppid=2664 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:47.752000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:47.915037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4231649733.mount: Deactivated successfully. Feb 9 09:58:48.826764 env[1396]: time="2024-02-09T09:58:48.826717866Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:48.835067 env[1396]: time="2024-02-09T09:58:48.835013188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:48.842314 env[1396]: time="2024-02-09T09:58:48.842267809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:48.849054 env[1396]: time="2024-02-09T09:58:48.849001440Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:48.849990 env[1396]: time="2024-02-09T09:58:48.849953342Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 09:58:48.852937 env[1396]: time="2024-02-09T09:58:48.852197019Z" level=info msg="CreateContainer within sandbox \"7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 09:58:48.932248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1134969799.mount: Deactivated successfully. Feb 9 09:58:48.935587 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount593209283.mount: Deactivated successfully. Feb 9 09:58:49.065469 env[1396]: time="2024-02-09T09:58:49.065407486Z" level=info msg="CreateContainer within sandbox \"7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67\"" Feb 9 09:58:49.065984 env[1396]: time="2024-02-09T09:58:49.065948916Z" level=info msg="StartContainer for \"7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67\"" Feb 9 09:58:49.084950 systemd[1]: Started cri-containerd-7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67.scope. Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.099000 audit: BPF prog-id=121 op=LOAD Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2572 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:49.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646632363963623863396135376165393162306336336535353963 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2572 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:49.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646632363963623863396135376165393162306336336535353963 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.100000 audit: BPF prog-id=122 op=LOAD Feb 9 09:58:49.100000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2572 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:49.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646632363963623863396135376165393162306336336535353963 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.101000 audit: BPF prog-id=123 op=LOAD Feb 9 09:58:49.101000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2572 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646632363963623863396135376165393162306336336535353963 Feb 9 09:58:49.102000 audit: BPF prog-id=123 op=UNLOAD Feb 9 09:58:49.102000 audit: BPF prog-id=122 op=UNLOAD Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:49.102000 audit: BPF prog-id=124 op=LOAD Feb 9 09:58:49.102000 audit[2805]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2572 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:49.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646632363963623863396135376165393162306336336535353963 Feb 9 09:58:49.123158 env[1396]: time="2024-02-09T09:58:49.123102724Z" level=info msg="StartContainer for \"7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67\" returns successfully" Feb 9 09:58:49.259491 kubelet[2492]: I0209 09:58:49.259438 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-lnvkh" podStartSLOduration=4.25938429 podCreationTimestamp="2024-02-09 09:58:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:58:48.257642147 +0000 UTC m=+17.328272021" watchObservedRunningTime="2024-02-09 09:58:49.25938429 +0000 UTC m=+18.330014164" Feb 9 09:58:49.259895 kubelet[2492]: I0209 09:58:49.259579 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-79grx" podStartSLOduration=1.138643818 podCreationTimestamp="2024-02-09 09:58:45 +0000 UTC" firstStartedPulling="2024-02-09 09:58:45.729463425 +0000 UTC m=+14.800093259" lastFinishedPulling="2024-02-09 09:58:48.850372494 +0000 UTC m=+17.921002328" observedRunningTime="2024-02-09 09:58:49.259118455 +0000 UTC m=+18.329748329" watchObservedRunningTime="2024-02-09 09:58:49.259552887 +0000 UTC m=+18.330182761" Feb 9 09:58:51.833000 audit[2837]: NETFILTER_CFG table=filter:93 family=2 entries=14 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:51.840799 kernel: kauditd_printk_skb: 369 callbacks suppressed Feb 9 09:58:51.840863 kernel: audit: type=1325 audit(1707472731.833:876): table=filter:93 family=2 entries=14 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:51.833000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe342f570 a2=0 a3=ffffb6a8c6c0 items=0 ppid=2664 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:51.891376 kernel: audit: type=1300 audit(1707472731.833:876): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe342f570 a2=0 a3=ffffb6a8c6c0 items=0 ppid=2664 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:51.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:51.911297 kernel: audit: type=1327 audit(1707472731.833:876): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:51.857000 audit[2837]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:51.857000 audit[2837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe342f570 a2=0 a3=ffffb6a8c6c0 items=0 ppid=2664 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:51.962930 kernel: audit: type=1325 audit(1707472731.857:877): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2837 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:51.963067 kernel: audit: type=1300 audit(1707472731.857:877): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffe342f570 a2=0 a3=ffffb6a8c6c0 items=0 ppid=2664 pid=2837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:51.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:51.979394 kernel: audit: type=1327 audit(1707472731.857:877): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:52.009365 kubelet[2492]: I0209 09:58:52.009318 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:52.014107 systemd[1]: Created slice kubepods-besteffort-pod6ca6a951_69b4_4dae_a22a_7e8d7853425b.slice. Feb 9 09:58:52.061000 audit[2839]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:52.061000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff84916b0 a2=0 a3=ffffa7b286c0 items=0 ppid=2664 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.113476 kernel: audit: type=1325 audit(1707472732.061:878): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:52.113626 kernel: audit: type=1300 audit(1707472732.061:878): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff84916b0 a2=0 a3=ffffa7b286c0 items=0 ppid=2664 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.061000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:52.132104 kernel: audit: type=1327 audit(1707472732.061:878): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:52.077000 audit[2839]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:52.145172 kubelet[2492]: I0209 09:58:52.145137 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fplp5\" (UniqueName: \"kubernetes.io/projected/6ca6a951-69b4-4dae-a22a-7e8d7853425b-kube-api-access-fplp5\") pod \"calico-typha-64cd6f5694-gvvk8\" (UID: \"6ca6a951-69b4-4dae-a22a-7e8d7853425b\") " pod="calico-system/calico-typha-64cd6f5694-gvvk8" Feb 9 09:58:52.145345 kubelet[2492]: I0209 09:58:52.145334 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6ca6a951-69b4-4dae-a22a-7e8d7853425b-tigera-ca-bundle\") pod \"calico-typha-64cd6f5694-gvvk8\" (UID: \"6ca6a951-69b4-4dae-a22a-7e8d7853425b\") " pod="calico-system/calico-typha-64cd6f5694-gvvk8" Feb 9 09:58:52.145415 kubelet[2492]: I0209 09:58:52.145405 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6ca6a951-69b4-4dae-a22a-7e8d7853425b-typha-certs\") pod \"calico-typha-64cd6f5694-gvvk8\" (UID: \"6ca6a951-69b4-4dae-a22a-7e8d7853425b\") " pod="calico-system/calico-typha-64cd6f5694-gvvk8" Feb 9 09:58:52.151658 kernel: audit: type=1325 audit(1707472732.077:879): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:52.077000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff84916b0 a2=0 a3=ffffa7b286c0 items=0 ppid=2664 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:52.160714 kubelet[2492]: I0209 09:58:52.160668 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:52.165642 systemd[1]: Created slice kubepods-besteffort-pod1ed2041b_3a24_41f1_bc2b_02ccc6ba5857.slice. Feb 9 09:58:52.245991 kubelet[2492]: I0209 09:58:52.245956 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-lib-modules\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246231 kubelet[2492]: I0209 09:58:52.246216 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-xtables-lock\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246337 kubelet[2492]: I0209 09:58:52.246326 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-tigera-ca-bundle\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246430 kubelet[2492]: I0209 09:58:52.246421 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-node-certs\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246517 kubelet[2492]: I0209 09:58:52.246508 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-cni-log-dir\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246610 kubelet[2492]: I0209 09:58:52.246601 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-flexvol-driver-host\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246703 kubelet[2492]: I0209 09:58:52.246693 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kx52s\" (UniqueName: \"kubernetes.io/projected/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-kube-api-access-kx52s\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246816 kubelet[2492]: I0209 09:58:52.246806 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-var-lib-calico\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246950 kubelet[2492]: I0209 09:58:52.246913 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-cni-bin-dir\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246992 kubelet[2492]: I0209 09:58:52.246957 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-cni-net-dir\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.246992 kubelet[2492]: I0209 09:58:52.246979 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-policysync\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.247044 kubelet[2492]: I0209 09:58:52.246999 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1ed2041b-3a24-41f1-bc2b-02ccc6ba5857-var-run-calico\") pod \"calico-node-q2w2m\" (UID: \"1ed2041b-3a24-41f1-bc2b-02ccc6ba5857\") " pod="calico-system/calico-node-q2w2m" Feb 9 09:58:52.315919 kubelet[2492]: I0209 09:58:52.315869 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:58:52.316212 kubelet[2492]: E0209 09:58:52.316188 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:58:52.319496 env[1396]: time="2024-02-09T09:58:52.319437948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64cd6f5694-gvvk8,Uid:6ca6a951-69b4-4dae-a22a-7e8d7853425b,Namespace:calico-system,Attempt:0,}" Feb 9 09:58:52.364110 env[1396]: time="2024-02-09T09:58:52.363652126Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:52.364110 env[1396]: time="2024-02-09T09:58:52.363867922Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:52.364110 env[1396]: time="2024-02-09T09:58:52.363897241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:52.364110 env[1396]: time="2024-02-09T09:58:52.364055278Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/812467a32e9c2e2628a69514931fcccf34febbdaffba0bb472ac98de272eba23 pid=2850 runtime=io.containerd.runc.v2 Feb 9 09:58:52.365466 kubelet[2492]: E0209 09:58:52.365389 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.368146 kubelet[2492]: W0209 09:58:52.368103 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.368318 kubelet[2492]: E0209 09:58:52.368305 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.371422 kubelet[2492]: E0209 09:58:52.370730 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.371422 kubelet[2492]: W0209 09:58:52.370755 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.371422 kubelet[2492]: E0209 09:58:52.370779 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.375527 kubelet[2492]: E0209 09:58:52.375489 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.375527 kubelet[2492]: W0209 09:58:52.375517 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.375705 kubelet[2492]: E0209 09:58:52.375554 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.375789 kubelet[2492]: E0209 09:58:52.375767 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.375789 kubelet[2492]: W0209 09:58:52.375781 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.375855 kubelet[2492]: E0209 09:58:52.375800 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.378246 kubelet[2492]: E0209 09:58:52.378210 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.378246 kubelet[2492]: W0209 09:58:52.378235 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.378471 kubelet[2492]: E0209 09:58:52.378455 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.378541 kubelet[2492]: E0209 09:58:52.378458 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.378599 kubelet[2492]: W0209 09:58:52.378587 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.378659 kubelet[2492]: E0209 09:58:52.378650 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.378996 kubelet[2492]: E0209 09:58:52.378982 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.379115 kubelet[2492]: W0209 09:58:52.379102 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.379182 kubelet[2492]: E0209 09:58:52.379173 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.380185 kubelet[2492]: E0209 09:58:52.380166 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.380292 kubelet[2492]: W0209 09:58:52.380279 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.380356 kubelet[2492]: E0209 09:58:52.380348 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.380590 kubelet[2492]: E0209 09:58:52.380579 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.380672 kubelet[2492]: W0209 09:58:52.380660 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.380733 kubelet[2492]: E0209 09:58:52.380724 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.382114 kubelet[2492]: E0209 09:58:52.382090 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.382474 kubelet[2492]: W0209 09:58:52.382456 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.382552 kubelet[2492]: E0209 09:58:52.382542 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.383397 kubelet[2492]: E0209 09:58:52.383383 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.383502 kubelet[2492]: W0209 09:58:52.383488 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.383763 kubelet[2492]: E0209 09:58:52.383749 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.386206 systemd[1]: Started cri-containerd-812467a32e9c2e2628a69514931fcccf34febbdaffba0bb472ac98de272eba23.scope. Feb 9 09:58:52.387973 kubelet[2492]: E0209 09:58:52.387953 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.388414 kubelet[2492]: W0209 09:58:52.388366 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.392201 kubelet[2492]: E0209 09:58:52.392170 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.399140 kubelet[2492]: E0209 09:58:52.399114 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.399321 kubelet[2492]: W0209 09:58:52.399304 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.399388 kubelet[2492]: E0209 09:58:52.399377 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.417206 kubelet[2492]: E0209 09:58:52.417177 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.417359 kubelet[2492]: W0209 09:58:52.417342 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.417452 kubelet[2492]: E0209 09:58:52.417442 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.418763 kubelet[2492]: E0209 09:58:52.418742 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.418902 kubelet[2492]: W0209 09:58:52.418888 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.418984 kubelet[2492]: E0209 09:58:52.418960 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.421207 kubelet[2492]: E0209 09:58:52.421183 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.421347 kubelet[2492]: W0209 09:58:52.421333 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.421428 kubelet[2492]: E0209 09:58:52.421418 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.421749 kubelet[2492]: E0209 09:58:52.421727 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.421842 kubelet[2492]: W0209 09:58:52.421830 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.421899 kubelet[2492]: E0209 09:58:52.421890 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.422578 kubelet[2492]: E0209 09:58:52.422563 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.422681 kubelet[2492]: W0209 09:58:52.422668 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.422795 kubelet[2492]: E0209 09:58:52.422785 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.423174 kubelet[2492]: E0209 09:58:52.423153 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.423256 kubelet[2492]: W0209 09:58:52.423245 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.423326 kubelet[2492]: E0209 09:58:52.423316 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.423605 kubelet[2492]: E0209 09:58:52.423592 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.423685 kubelet[2492]: W0209 09:58:52.423674 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.423755 kubelet[2492]: E0209 09:58:52.423745 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.424000 audit: BPF prog-id=125 op=LOAD Feb 9 09:58:52.426741 kubelet[2492]: E0209 09:58:52.426723 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.426844 kubelet[2492]: W0209 09:58:52.426827 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.426920 kubelet[2492]: E0209 09:58:52.426909 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.427232 kubelet[2492]: E0209 09:58:52.427220 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.427319 kubelet[2492]: W0209 09:58:52.427308 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2850 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323436376133326539633265323632386136393531343933316663 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2850 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323436376133326539633265323632386136393531343933316663 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit: BPF prog-id=126 op=LOAD Feb 9 09:58:52.425000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2850 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323436376133326539633265323632386136393531343933316663 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.425000 audit: BPF prog-id=127 op=LOAD Feb 9 09:58:52.425000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2850 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323436376133326539633265323632386136393531343933316663 Feb 9 09:58:52.425000 audit: BPF prog-id=127 op=UNLOAD Feb 9 09:58:52.426000 audit: BPF prog-id=126 op=UNLOAD Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.426000 audit: BPF prog-id=128 op=LOAD Feb 9 09:58:52.426000 audit[2860]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2850 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323436376133326539633265323632386136393531343933316663 Feb 9 09:58:52.428574 kubelet[2492]: E0209 09:58:52.428144 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.428797 kubelet[2492]: E0209 09:58:52.428766 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.428797 kubelet[2492]: W0209 09:58:52.428784 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.428885 kubelet[2492]: E0209 09:58:52.428800 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.429066 kubelet[2492]: E0209 09:58:52.429035 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.429066 kubelet[2492]: W0209 09:58:52.429056 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.429066 kubelet[2492]: E0209 09:58:52.429079 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.429363 kubelet[2492]: E0209 09:58:52.429306 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.429363 kubelet[2492]: W0209 09:58:52.429325 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.429363 kubelet[2492]: E0209 09:58:52.429338 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.429621 kubelet[2492]: E0209 09:58:52.429601 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.429621 kubelet[2492]: W0209 09:58:52.429619 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.429621 kubelet[2492]: E0209 09:58:52.429632 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.429859 kubelet[2492]: E0209 09:58:52.429842 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.429859 kubelet[2492]: W0209 09:58:52.429857 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.429859 kubelet[2492]: E0209 09:58:52.429868 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.430137 kubelet[2492]: E0209 09:58:52.430089 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.430137 kubelet[2492]: W0209 09:58:52.430103 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.430137 kubelet[2492]: E0209 09:58:52.430119 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.470095 env[1396]: time="2024-02-09T09:58:52.470016524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q2w2m,Uid:1ed2041b-3a24-41f1-bc2b-02ccc6ba5857,Namespace:calico-system,Attempt:0,}" Feb 9 09:58:52.474319 env[1396]: time="2024-02-09T09:58:52.474243010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64cd6f5694-gvvk8,Uid:6ca6a951-69b4-4dae-a22a-7e8d7853425b,Namespace:calico-system,Attempt:0,} returns sandbox id \"812467a32e9c2e2628a69514931fcccf34febbdaffba0bb472ac98de272eba23\"" Feb 9 09:58:52.476481 kubelet[2492]: E0209 09:58:52.476456 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.476624 kubelet[2492]: W0209 09:58:52.476610 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.476710 kubelet[2492]: E0209 09:58:52.476700 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.476794 kubelet[2492]: I0209 09:58:52.476783 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/481a078e-d96a-457e-bfcb-155d0b9aa028-registration-dir\") pod \"csi-node-driver-xk4kl\" (UID: \"481a078e-d96a-457e-bfcb-155d0b9aa028\") " pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:58:52.477116 kubelet[2492]: E0209 09:58:52.477089 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.477116 kubelet[2492]: W0209 09:58:52.477109 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.477215 kubelet[2492]: E0209 09:58:52.477127 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.477294 kubelet[2492]: E0209 09:58:52.477272 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.477294 kubelet[2492]: W0209 09:58:52.477286 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.477350 kubelet[2492]: E0209 09:58:52.477298 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.477495 kubelet[2492]: E0209 09:58:52.477472 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.477495 kubelet[2492]: W0209 09:58:52.477486 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.477495 kubelet[2492]: E0209 09:58:52.477498 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.477606 kubelet[2492]: I0209 09:58:52.477522 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/481a078e-d96a-457e-bfcb-155d0b9aa028-kubelet-dir\") pod \"csi-node-driver-xk4kl\" (UID: \"481a078e-d96a-457e-bfcb-155d0b9aa028\") " pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:58:52.477704 kubelet[2492]: E0209 09:58:52.477683 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.477704 kubelet[2492]: W0209 09:58:52.477697 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.477778 kubelet[2492]: E0209 09:58:52.477718 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.477778 kubelet[2492]: I0209 09:58:52.477735 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/481a078e-d96a-457e-bfcb-155d0b9aa028-socket-dir\") pod \"csi-node-driver-xk4kl\" (UID: \"481a078e-d96a-457e-bfcb-155d0b9aa028\") " pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:58:52.477898 kubelet[2492]: E0209 09:58:52.477882 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.477898 kubelet[2492]: W0209 09:58:52.477895 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.477963 kubelet[2492]: E0209 09:58:52.477907 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.478053 kubelet[2492]: E0209 09:58:52.478038 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.478053 kubelet[2492]: W0209 09:58:52.478050 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478062 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478252 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.479762 kubelet[2492]: W0209 09:58:52.478261 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478272 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.479762 kubelet[2492]: I0209 09:58:52.478290 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l2wtk\" (UniqueName: \"kubernetes.io/projected/481a078e-d96a-457e-bfcb-155d0b9aa028-kube-api-access-l2wtk\") pod \"csi-node-driver-xk4kl\" (UID: \"481a078e-d96a-457e-bfcb-155d0b9aa028\") " pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478457 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.479762 kubelet[2492]: W0209 09:58:52.478466 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478479 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.479762 kubelet[2492]: E0209 09:58:52.478593 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.479985 kubelet[2492]: W0209 09:58:52.478612 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479985 kubelet[2492]: E0209 09:58:52.478623 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.479985 kubelet[2492]: E0209 09:58:52.478793 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.479985 kubelet[2492]: W0209 09:58:52.478802 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479985 kubelet[2492]: E0209 09:58:52.478812 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.479985 kubelet[2492]: I0209 09:58:52.478829 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/481a078e-d96a-457e-bfcb-155d0b9aa028-varrun\") pod \"csi-node-driver-xk4kl\" (UID: \"481a078e-d96a-457e-bfcb-155d0b9aa028\") " pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:58:52.479985 kubelet[2492]: E0209 09:58:52.478995 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.479985 kubelet[2492]: W0209 09:58:52.479005 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.479985 kubelet[2492]: E0209 09:58:52.479017 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479167 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.480215 kubelet[2492]: W0209 09:58:52.479177 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479187 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479345 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.480215 kubelet[2492]: W0209 09:58:52.479353 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479364 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479484 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.480215 kubelet[2492]: W0209 09:58:52.479501 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.480215 kubelet[2492]: E0209 09:58:52.479511 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.480668 env[1396]: time="2024-02-09T09:58:52.480637136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 09:58:52.509262 env[1396]: time="2024-02-09T09:58:52.509173512Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:58:52.509434 env[1396]: time="2024-02-09T09:58:52.509290350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:58:52.509434 env[1396]: time="2024-02-09T09:58:52.509318389Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:58:52.509514 env[1396]: time="2024-02-09T09:58:52.509477506Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d pid=2934 runtime=io.containerd.runc.v2 Feb 9 09:58:52.524396 systemd[1]: Started cri-containerd-f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d.scope. Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.535000 audit: BPF prog-id=129 op=LOAD Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2934 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632653837373262613861613934393864356339333838306434373036 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2934 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632653837373262613861613934393864356339333838306434373036 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.536000 audit: BPF prog-id=130 op=LOAD Feb 9 09:58:52.536000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2934 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632653837373262613861613934393864356339333838306434373036 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.537000 audit: BPF prog-id=131 op=LOAD Feb 9 09:58:52.537000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2934 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632653837373262613861613934393864356339333838306434373036 Feb 9 09:58:52.538000 audit: BPF prog-id=131 op=UNLOAD Feb 9 09:58:52.538000 audit: BPF prog-id=130 op=UNLOAD Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { perfmon } for pid=2943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit[2943]: AVC avc: denied { bpf } for pid=2943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.538000 audit: BPF prog-id=132 op=LOAD Feb 9 09:58:52.538000 audit[2943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2934 pid=2943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:52.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632653837373262613861613934393864356339333838306434373036 Feb 9 09:58:52.561319 env[1396]: time="2024-02-09T09:58:52.560982195Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q2w2m,Uid:1ed2041b-3a24-41f1-bc2b-02ccc6ba5857,Namespace:calico-system,Attempt:0,} returns sandbox id \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\"" Feb 9 09:58:52.580265 kubelet[2492]: E0209 09:58:52.580011 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.580265 kubelet[2492]: W0209 09:58:52.580042 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.580265 kubelet[2492]: E0209 09:58:52.580066 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.580702 kubelet[2492]: E0209 09:58:52.580529 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.580702 kubelet[2492]: W0209 09:58:52.580542 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.580702 kubelet[2492]: E0209 09:58:52.580580 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.581140 kubelet[2492]: E0209 09:58:52.580889 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.581140 kubelet[2492]: W0209 09:58:52.580910 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.581140 kubelet[2492]: E0209 09:58:52.580927 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.581447 kubelet[2492]: E0209 09:58:52.581288 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.581447 kubelet[2492]: W0209 09:58:52.581300 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.581447 kubelet[2492]: E0209 09:58:52.581323 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.581851 kubelet[2492]: E0209 09:58:52.581622 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.581851 kubelet[2492]: W0209 09:58:52.581632 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.581851 kubelet[2492]: E0209 09:58:52.581718 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.582132 kubelet[2492]: E0209 09:58:52.581995 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.582132 kubelet[2492]: W0209 09:58:52.582005 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.582132 kubelet[2492]: E0209 09:58:52.582152 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.582574 kubelet[2492]: E0209 09:58:52.582435 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.582574 kubelet[2492]: W0209 09:58:52.582448 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.582574 kubelet[2492]: E0209 09:58:52.582549 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.582856 kubelet[2492]: E0209 09:58:52.582748 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.582856 kubelet[2492]: W0209 09:58:52.582757 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.582856 kubelet[2492]: E0209 09:58:52.582792 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.583143 kubelet[2492]: E0209 09:58:52.583021 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.583143 kubelet[2492]: W0209 09:58:52.583031 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.583143 kubelet[2492]: E0209 09:58:52.583063 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.583426 kubelet[2492]: E0209 09:58:52.583323 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.583426 kubelet[2492]: W0209 09:58:52.583334 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.583426 kubelet[2492]: E0209 09:58:52.583369 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.583698 kubelet[2492]: E0209 09:58:52.583590 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.583698 kubelet[2492]: W0209 09:58:52.583600 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.583698 kubelet[2492]: E0209 09:58:52.583631 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.583958 kubelet[2492]: E0209 09:58:52.583865 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.583958 kubelet[2492]: W0209 09:58:52.583875 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.583958 kubelet[2492]: E0209 09:58:52.583905 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.584178 kubelet[2492]: E0209 09:58:52.584167 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.584378 kubelet[2492]: W0209 09:58:52.584254 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.584378 kubelet[2492]: E0209 09:58:52.584307 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.584618 kubelet[2492]: E0209 09:58:52.584605 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.584704 kubelet[2492]: W0209 09:58:52.584692 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.584954 kubelet[2492]: E0209 09:58:52.584940 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.585039 kubelet[2492]: W0209 09:58:52.585027 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.585295 kubelet[2492]: E0209 09:58:52.585281 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.585390 kubelet[2492]: W0209 09:58:52.585378 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.585522 kubelet[2492]: E0209 09:58:52.585385 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.585587 kubelet[2492]: E0209 09:58:52.585367 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.585658 kubelet[2492]: E0209 09:58:52.585647 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.585865 kubelet[2492]: E0209 09:58:52.585853 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.585954 kubelet[2492]: W0209 09:58:52.585942 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.586169 kubelet[2492]: E0209 09:58:52.586156 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.586397 kubelet[2492]: E0209 09:58:52.586385 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.586480 kubelet[2492]: W0209 09:58:52.586468 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.586638 kubelet[2492]: E0209 09:58:52.586627 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.586829 kubelet[2492]: E0209 09:58:52.586817 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.586918 kubelet[2492]: W0209 09:58:52.586905 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.586983 kubelet[2492]: E0209 09:58:52.586973 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.587232 kubelet[2492]: E0209 09:58:52.587220 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.587319 kubelet[2492]: W0209 09:58:52.587307 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.587384 kubelet[2492]: E0209 09:58:52.587374 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.588016 kubelet[2492]: E0209 09:58:52.587991 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.588016 kubelet[2492]: W0209 09:58:52.588011 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.588232 kubelet[2492]: E0209 09:58:52.588034 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.588296 kubelet[2492]: E0209 09:58:52.588275 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.588296 kubelet[2492]: W0209 09:58:52.588292 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.588365 kubelet[2492]: E0209 09:58:52.588312 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.589173 kubelet[2492]: E0209 09:58:52.589151 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.589173 kubelet[2492]: W0209 09:58:52.589169 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.589267 kubelet[2492]: E0209 09:58:52.589197 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.589614 kubelet[2492]: E0209 09:58:52.589600 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.589693 kubelet[2492]: W0209 09:58:52.589680 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.589763 kubelet[2492]: E0209 09:58:52.589753 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.589992 kubelet[2492]: E0209 09:58:52.589981 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.590158 kubelet[2492]: W0209 09:58:52.590059 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.590244 kubelet[2492]: E0209 09:58:52.590232 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:52.606207 kubelet[2492]: E0209 09:58:52.606182 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:52.606362 kubelet[2492]: W0209 09:58:52.606348 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:52.606461 kubelet[2492]: E0209 09:58:52.606451 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:53.146000 audit[2995]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:53.146000 audit[2995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc7ad6db0 a2=0 a3=ffffbc8aa6c0 items=0 ppid=2664 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:53.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:53.147000 audit[2995]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:58:53.147000 audit[2995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc7ad6db0 a2=0 a3=ffffbc8aa6c0 items=0 ppid=2664 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:53.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:58:53.713807 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1912762394.mount: Deactivated successfully. Feb 9 09:58:54.179440 kubelet[2492]: E0209 09:58:54.179416 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:58:55.838751 env[1396]: time="2024-02-09T09:58:55.838704929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:55.848195 env[1396]: time="2024-02-09T09:58:55.848134571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:55.854528 env[1396]: time="2024-02-09T09:58:55.854474025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:55.858923 env[1396]: time="2024-02-09T09:58:55.858853432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:58:55.859600 env[1396]: time="2024-02-09T09:58:55.859567380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 09:58:55.860703 env[1396]: time="2024-02-09T09:58:55.860671761Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:58:55.873050 env[1396]: time="2024-02-09T09:58:55.873009315Z" level=info msg="CreateContainer within sandbox \"812467a32e9c2e2628a69514931fcccf34febbdaffba0bb472ac98de272eba23\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 09:58:55.927642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2105285699.mount: Deactivated successfully. Feb 9 09:58:55.948014 env[1396]: time="2024-02-09T09:58:55.945791858Z" level=info msg="CreateContainer within sandbox \"812467a32e9c2e2628a69514931fcccf34febbdaffba0bb472ac98de272eba23\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"40317edc6284d9fadcfbfb65870a9f14757e9689db7cfa35ebb13c2b535f45b3\"" Feb 9 09:58:55.948014 env[1396]: time="2024-02-09T09:58:55.946590884Z" level=info msg="StartContainer for \"40317edc6284d9fadcfbfb65870a9f14757e9689db7cfa35ebb13c2b535f45b3\"" Feb 9 09:58:55.967350 systemd[1]: Started cri-containerd-40317edc6284d9fadcfbfb65870a9f14757e9689db7cfa35ebb13c2b535f45b3.scope. Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit: BPF prog-id=133 op=LOAD Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2850 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333137656463363238346439666164636662666236353837306139 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2850 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333137656463363238346439666164636662666236353837306139 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit: BPF prog-id=134 op=LOAD Feb 9 09:58:55.983000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2850 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333137656463363238346439666164636662666236353837306139 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.983000 audit: BPF prog-id=135 op=LOAD Feb 9 09:58:55.983000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2850 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333137656463363238346439666164636662666236353837306139 Feb 9 09:58:55.983000 audit: BPF prog-id=135 op=UNLOAD Feb 9 09:58:55.984000 audit: BPF prog-id=134 op=UNLOAD Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.984000 audit: BPF prog-id=136 op=LOAD Feb 9 09:58:55.984000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2850 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430333137656463363238346439666164636662666236353837306139 Feb 9 09:58:56.025339 env[1396]: time="2024-02-09T09:58:56.025277216Z" level=info msg="StartContainer for \"40317edc6284d9fadcfbfb65870a9f14757e9689db7cfa35ebb13c2b535f45b3\" returns successfully" Feb 9 09:58:56.179487 kubelet[2492]: E0209 09:58:56.179092 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:58:56.359448 kubelet[2492]: E0209 09:58:56.359420 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.359605 kubelet[2492]: W0209 09:58:56.359590 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.359721 kubelet[2492]: E0209 09:58:56.359709 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.359989 kubelet[2492]: E0209 09:58:56.359977 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.360106 kubelet[2492]: W0209 09:58:56.360092 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.360185 kubelet[2492]: E0209 09:58:56.360176 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.360450 kubelet[2492]: E0209 09:58:56.360437 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.360556 kubelet[2492]: W0209 09:58:56.360544 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.360635 kubelet[2492]: E0209 09:58:56.360626 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.360912 kubelet[2492]: E0209 09:58:56.360900 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.361005 kubelet[2492]: W0209 09:58:56.360994 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.361096 kubelet[2492]: E0209 09:58:56.361070 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.361311 kubelet[2492]: E0209 09:58:56.361290 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.361390 kubelet[2492]: W0209 09:58:56.361368 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.361476 kubelet[2492]: E0209 09:58:56.361468 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.361696 kubelet[2492]: E0209 09:58:56.361679 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.361768 kubelet[2492]: W0209 09:58:56.361757 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.361829 kubelet[2492]: E0209 09:58:56.361812 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.362126 kubelet[2492]: E0209 09:58:56.362114 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.362214 kubelet[2492]: W0209 09:58:56.362204 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.362300 kubelet[2492]: E0209 09:58:56.362291 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.362498 kubelet[2492]: E0209 09:58:56.362487 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.362586 kubelet[2492]: W0209 09:58:56.362575 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.362663 kubelet[2492]: E0209 09:58:56.362654 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.362871 kubelet[2492]: E0209 09:58:56.362861 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.362960 kubelet[2492]: W0209 09:58:56.362950 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.363032 kubelet[2492]: E0209 09:58:56.363011 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.363286 kubelet[2492]: E0209 09:58:56.363276 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.363355 kubelet[2492]: W0209 09:58:56.363345 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.363420 kubelet[2492]: E0209 09:58:56.363399 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.363610 kubelet[2492]: E0209 09:58:56.363600 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.363703 kubelet[2492]: W0209 09:58:56.363692 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.363758 kubelet[2492]: E0209 09:58:56.363749 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.363955 kubelet[2492]: E0209 09:58:56.363945 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.364022 kubelet[2492]: W0209 09:58:56.364012 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.364107 kubelet[2492]: E0209 09:58:56.364097 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.408519 kubelet[2492]: E0209 09:58:56.408492 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.408697 kubelet[2492]: W0209 09:58:56.408682 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.408761 kubelet[2492]: E0209 09:58:56.408751 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.409126 kubelet[2492]: E0209 09:58:56.409110 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.409217 kubelet[2492]: W0209 09:58:56.409206 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.409295 kubelet[2492]: E0209 09:58:56.409286 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.409561 kubelet[2492]: E0209 09:58:56.409549 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.409650 kubelet[2492]: W0209 09:58:56.409638 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.409722 kubelet[2492]: E0209 09:58:56.409711 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.411121 kubelet[2492]: E0209 09:58:56.411101 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.411253 kubelet[2492]: W0209 09:58:56.411238 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.411321 kubelet[2492]: E0209 09:58:56.411312 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.411636 kubelet[2492]: E0209 09:58:56.411624 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.411724 kubelet[2492]: W0209 09:58:56.411712 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.411852 kubelet[2492]: E0209 09:58:56.411828 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.412051 kubelet[2492]: E0209 09:58:56.412037 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.412163 kubelet[2492]: W0209 09:58:56.412149 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.412268 kubelet[2492]: E0209 09:58:56.412239 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.412468 kubelet[2492]: E0209 09:58:56.412454 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.412551 kubelet[2492]: W0209 09:58:56.412539 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.412632 kubelet[2492]: E0209 09:58:56.412614 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.412832 kubelet[2492]: E0209 09:58:56.412819 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.412912 kubelet[2492]: W0209 09:58:56.412901 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.412977 kubelet[2492]: E0209 09:58:56.412967 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.413426 kubelet[2492]: E0209 09:58:56.413409 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.413523 kubelet[2492]: W0209 09:58:56.413511 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.413591 kubelet[2492]: E0209 09:58:56.413581 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.413835 kubelet[2492]: E0209 09:58:56.413817 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.413835 kubelet[2492]: W0209 09:58:56.413832 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.413915 kubelet[2492]: E0209 09:58:56.413851 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.414040 kubelet[2492]: E0209 09:58:56.414025 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.414040 kubelet[2492]: W0209 09:58:56.414039 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.414189 kubelet[2492]: E0209 09:58:56.414175 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.414653 kubelet[2492]: E0209 09:58:56.414634 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.414653 kubelet[2492]: W0209 09:58:56.414649 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.414786 kubelet[2492]: E0209 09:58:56.414772 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.414854 kubelet[2492]: E0209 09:58:56.414814 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.414917 kubelet[2492]: W0209 09:58:56.414906 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.414994 kubelet[2492]: E0209 09:58:56.414977 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.415224 kubelet[2492]: E0209 09:58:56.415210 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.415293 kubelet[2492]: W0209 09:58:56.415282 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.415354 kubelet[2492]: E0209 09:58:56.415345 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.415592 kubelet[2492]: E0209 09:58:56.415578 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.415675 kubelet[2492]: W0209 09:58:56.415664 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.415745 kubelet[2492]: E0209 09:58:56.415734 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.415969 kubelet[2492]: E0209 09:58:56.415957 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.416041 kubelet[2492]: W0209 09:58:56.416030 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.416153 kubelet[2492]: E0209 09:58:56.416143 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.416359 kubelet[2492]: E0209 09:58:56.416337 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.416359 kubelet[2492]: W0209 09:58:56.416354 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.416439 kubelet[2492]: E0209 09:58:56.416373 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:56.416602 kubelet[2492]: E0209 09:58:56.416577 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:56.416602 kubelet[2492]: W0209 09:58:56.416590 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:56.416666 kubelet[2492]: E0209 09:58:56.416606 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.178132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount247883598.mount: Deactivated successfully. Feb 9 09:58:57.277710 kubelet[2492]: I0209 09:58:57.277674 2492 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:58:57.369922 kubelet[2492]: E0209 09:58:57.369889 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.369922 kubelet[2492]: W0209 09:58:57.369913 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370107 kubelet[2492]: E0209 09:58:57.369936 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370167 kubelet[2492]: E0209 09:58:57.370107 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370167 kubelet[2492]: W0209 09:58:57.370116 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370167 kubelet[2492]: E0209 09:58:57.370128 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370282 kubelet[2492]: E0209 09:58:57.370263 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370282 kubelet[2492]: W0209 09:58:57.370270 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370282 kubelet[2492]: E0209 09:58:57.370280 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370458 kubelet[2492]: E0209 09:58:57.370443 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370458 kubelet[2492]: W0209 09:58:57.370455 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370534 kubelet[2492]: E0209 09:58:57.370467 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370599 kubelet[2492]: E0209 09:58:57.370585 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370599 kubelet[2492]: W0209 09:58:57.370596 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370666 kubelet[2492]: E0209 09:58:57.370606 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370742 kubelet[2492]: E0209 09:58:57.370726 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370742 kubelet[2492]: W0209 09:58:57.370736 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.370801 kubelet[2492]: E0209 09:58:57.370747 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.370978 kubelet[2492]: E0209 09:58:57.370963 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.370978 kubelet[2492]: W0209 09:58:57.370976 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371056 kubelet[2492]: E0209 09:58:57.370987 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.371147 kubelet[2492]: E0209 09:58:57.371134 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.371147 kubelet[2492]: W0209 09:58:57.371148 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371232 kubelet[2492]: E0209 09:58:57.371158 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.371302 kubelet[2492]: E0209 09:58:57.371290 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.371302 kubelet[2492]: W0209 09:58:57.371301 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371361 kubelet[2492]: E0209 09:58:57.371311 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.371461 kubelet[2492]: E0209 09:58:57.371448 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.371461 kubelet[2492]: W0209 09:58:57.371459 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371526 kubelet[2492]: E0209 09:58:57.371469 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.371614 kubelet[2492]: E0209 09:58:57.371601 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.371614 kubelet[2492]: W0209 09:58:57.371611 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371676 kubelet[2492]: E0209 09:58:57.371622 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.371767 kubelet[2492]: E0209 09:58:57.371755 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.371767 kubelet[2492]: W0209 09:58:57.371765 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.371825 kubelet[2492]: E0209 09:58:57.371775 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.417385 kubelet[2492]: E0209 09:58:57.417288 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.417385 kubelet[2492]: W0209 09:58:57.417310 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.417385 kubelet[2492]: E0209 09:58:57.417340 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.417600 kubelet[2492]: E0209 09:58:57.417515 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.417600 kubelet[2492]: W0209 09:58:57.417523 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.417600 kubelet[2492]: E0209 09:58:57.417535 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.417725 kubelet[2492]: E0209 09:58:57.417705 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.417725 kubelet[2492]: W0209 09:58:57.417718 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.417780 kubelet[2492]: E0209 09:58:57.417731 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.417927 kubelet[2492]: E0209 09:58:57.417910 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.417927 kubelet[2492]: W0209 09:58:57.417927 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.418013 kubelet[2492]: E0209 09:58:57.417946 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.418128 kubelet[2492]: E0209 09:58:57.418107 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.418128 kubelet[2492]: W0209 09:58:57.418122 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.418128 kubelet[2492]: E0209 09:58:57.418138 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.418282 kubelet[2492]: E0209 09:58:57.418267 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.418282 kubelet[2492]: W0209 09:58:57.418278 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.418350 kubelet[2492]: E0209 09:58:57.418295 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.418452 kubelet[2492]: E0209 09:58:57.418435 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.418452 kubelet[2492]: W0209 09:58:57.418448 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.418510 kubelet[2492]: E0209 09:58:57.418461 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.418713 kubelet[2492]: E0209 09:58:57.418699 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.418796 kubelet[2492]: W0209 09:58:57.418784 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.418867 kubelet[2492]: E0209 09:58:57.418857 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.419106 kubelet[2492]: E0209 09:58:57.419091 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.419221 kubelet[2492]: W0209 09:58:57.419207 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.419297 kubelet[2492]: E0209 09:58:57.419287 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.419538 kubelet[2492]: E0209 09:58:57.419521 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.419538 kubelet[2492]: W0209 09:58:57.419536 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.419629 kubelet[2492]: E0209 09:58:57.419555 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.419722 kubelet[2492]: E0209 09:58:57.419701 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.419722 kubelet[2492]: W0209 09:58:57.419715 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.419796 kubelet[2492]: E0209 09:58:57.419731 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.419890 kubelet[2492]: E0209 09:58:57.419868 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.419890 kubelet[2492]: W0209 09:58:57.419881 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.419952 kubelet[2492]: E0209 09:58:57.419892 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.420048 kubelet[2492]: E0209 09:58:57.420033 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.420048 kubelet[2492]: W0209 09:58:57.420045 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.420147 kubelet[2492]: E0209 09:58:57.420060 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.420384 kubelet[2492]: E0209 09:58:57.420368 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.420482 kubelet[2492]: W0209 09:58:57.420469 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.420551 kubelet[2492]: E0209 09:58:57.420542 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.420796 kubelet[2492]: E0209 09:58:57.420783 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.420871 kubelet[2492]: W0209 09:58:57.420860 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.420949 kubelet[2492]: E0209 09:58:57.420939 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.421221 kubelet[2492]: E0209 09:58:57.421203 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.421221 kubelet[2492]: W0209 09:58:57.421219 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.421318 kubelet[2492]: E0209 09:58:57.421233 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.421423 kubelet[2492]: E0209 09:58:57.421409 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.421423 kubelet[2492]: W0209 09:58:57.421421 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.421475 kubelet[2492]: E0209 09:58:57.421433 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.421776 kubelet[2492]: E0209 09:58:57.421760 2492 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.421776 kubelet[2492]: W0209 09:58:57.421773 2492 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.421842 kubelet[2492]: E0209 09:58:57.421786 2492 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:58.179452 kubelet[2492]: E0209 09:58:58.179415 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:00.179606 kubelet[2492]: E0209 09:59:00.179572 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:00.325490 env[1396]: time="2024-02-09T09:59:00.325436090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.379646 env[1396]: time="2024-02-09T09:59:00.378708114Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.423962 env[1396]: time="2024-02-09T09:59:00.423893782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.474058 env[1396]: time="2024-02-09T09:59:00.473704579Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.474338 env[1396]: time="2024-02-09T09:59:00.474305410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 09:59:00.477371 env[1396]: time="2024-02-09T09:59:00.477309524Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:59:00.780529 env[1396]: time="2024-02-09T09:59:00.780414762Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748\"" Feb 9 09:59:00.781386 env[1396]: time="2024-02-09T09:59:00.781353107Z" level=info msg="StartContainer for \"47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748\"" Feb 9 09:59:00.800988 systemd[1]: Started cri-containerd-47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748.scope. Feb 9 09:59:00.807037 systemd[1]: run-containerd-runc-k8s.io-47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748-runc.MYmebA.mount: Deactivated successfully. Feb 9 09:59:00.824000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.832125 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 09:59:00.832223 kernel: audit: type=1400 audit(1707472740.824:936): avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.824000 audit[3107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2934 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:00.883345 kernel: audit: type=1300 audit(1707472740.824:936): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2934 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:00.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393839663838393335373337656430623431643465616238663035 Feb 9 09:59:00.911754 kernel: audit: type=1327 audit(1707472740.824:936): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393839663838393335373337656430623431643465616238663035 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.932781 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.953047 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.975888 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.997320 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.018554 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.000089 systemd[1]: cri-containerd-47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748.scope: Deactivated successfully. Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.039091 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.060047 kernel: audit: type=1400 audit(1707472740.825:937): avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.060241 env[1396]: time="2024-02-09T09:59:01.039727520Z" level=info msg="StartContainer for \"47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748\" returns successfully" Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.825000 audit: BPF prog-id=137 op=LOAD Feb 9 09:59:00.825000 audit[3107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2934 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:00.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393839663838393335373337656430623431643465616238663035 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.831000 audit: BPF prog-id=138 op=LOAD Feb 9 09:59:00.831000 audit[3107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2934 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:00.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393839663838393335373337656430623431643465616238663035 Feb 9 09:59:00.851000 audit: BPF prog-id=138 op=UNLOAD Feb 9 09:59:00.852000 audit: BPF prog-id=137 op=UNLOAD Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:00.852000 audit: BPF prog-id=139 op=LOAD Feb 9 09:59:00.852000 audit[3107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2934 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:00.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437393839663838393335373337656430623431643465616238663035 Feb 9 09:59:01.039000 audit: BPF prog-id=139 op=UNLOAD Feb 9 09:59:01.305851 kubelet[2492]: I0209 09:59:01.304952 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-64cd6f5694-gvvk8" podStartSLOduration=6.921903075 podCreationTimestamp="2024-02-09 09:58:51 +0000 UTC" firstStartedPulling="2024-02-09 09:58:52.476933402 +0000 UTC m=+21.547563236" lastFinishedPulling="2024-02-09 09:58:55.859944374 +0000 UTC m=+24.930574248" observedRunningTime="2024-02-09 09:58:56.293222374 +0000 UTC m=+25.363852248" watchObservedRunningTime="2024-02-09 09:59:01.304914087 +0000 UTC m=+30.375543961" Feb 9 09:59:01.636357 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748-rootfs.mount: Deactivated successfully. Feb 9 09:59:02.180099 kubelet[2492]: E0209 09:59:02.180040 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:04.179201 kubelet[2492]: E0209 09:59:04.179154 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:06.179778 kubelet[2492]: E0209 09:59:06.179737 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:07.473462 env[1396]: time="2024-02-09T09:59:07.473218265Z" level=info msg="shim disconnected" id=47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748 Feb 9 09:59:07.473462 env[1396]: time="2024-02-09T09:59:07.473291304Z" level=warning msg="cleaning up after shim disconnected" id=47989f88935737ed0b41d4eab8f05c10b394ea7abc6b3b1a67eb233ac4a07748 namespace=k8s.io Feb 9 09:59:07.473462 env[1396]: time="2024-02-09T09:59:07.473301304Z" level=info msg="cleaning up dead shim" Feb 9 09:59:07.481654 env[1396]: time="2024-02-09T09:59:07.481607630Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:59:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3151 runtime=io.containerd.runc.v2\n" Feb 9 09:59:08.179846 kubelet[2492]: E0209 09:59:08.179803 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:08.302497 env[1396]: time="2024-02-09T09:59:08.301689511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:59:10.179467 kubelet[2492]: E0209 09:59:10.179428 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:10.418936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1783686878.mount: Deactivated successfully. Feb 9 09:59:12.180068 kubelet[2492]: E0209 09:59:12.179655 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:12.631194 env[1396]: time="2024-02-09T09:59:12.631055858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:12.636556 env[1396]: time="2024-02-09T09:59:12.636514308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:12.642177 env[1396]: time="2024-02-09T09:59:12.642137477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:12.645344 env[1396]: time="2024-02-09T09:59:12.645284797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:12.645993 env[1396]: time="2024-02-09T09:59:12.645959388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 09:59:12.649796 env[1396]: time="2024-02-09T09:59:12.649747980Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:59:12.679979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1306096664.mount: Deactivated successfully. Feb 9 09:59:12.711873 env[1396]: time="2024-02-09T09:59:12.711821711Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49\"" Feb 9 09:59:12.712547 env[1396]: time="2024-02-09T09:59:12.712517742Z" level=info msg="StartContainer for \"8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49\"" Feb 9 09:59:12.733290 systemd[1]: Started cri-containerd-8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49.scope. Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760941 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 09:59:12.761133 kernel: audit: type=1400 audit(1707472752.753:943): avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2934 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:12.814771 kernel: audit: type=1300 audit(1707472752.753:943): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=2934 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:12.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393430346334623536316238373439623031316334643235353136 Feb 9 09:59:12.847323 kernel: audit: type=1327 audit(1707472752.753:943): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393430346334623536316238373439623031316334643235353136 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.868947 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.890914 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.893831 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.936275 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.936423 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.957548 env[1396]: time="2024-02-09T09:59:12.957504187Z" level=info msg="StartContainer for \"8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49\" returns successfully" Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.979990 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:13.002343 kernel: audit: type=1400 audit(1707472752.753:944): avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.753000 audit: BPF prog-id=140 op=LOAD Feb 9 09:59:12.753000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=2934 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:12.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393430346334623536316238373439623031316334643235353136 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.760000 audit: BPF prog-id=141 op=LOAD Feb 9 09:59:12.760000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=2934 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:12.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393430346334623536316238373439623031316334643235353136 Feb 9 09:59:12.781000 audit: BPF prog-id=141 op=UNLOAD Feb 9 09:59:12.781000 audit: BPF prog-id=140 op=UNLOAD Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:12.781000 audit: BPF prog-id=142 op=LOAD Feb 9 09:59:12.781000 audit[3173]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=2934 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:12.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863393430346334623536316238373439623031316334643235353136 Feb 9 09:59:14.179317 kubelet[2492]: E0209 09:59:14.179277 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:16.179376 kubelet[2492]: E0209 09:59:16.179338 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:19.223492 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 09:59:20.625093 kernel: audit: type=1325 audit(1707472758.412:949): table=filter:99 family=2 entries=15 op=nft_register_rule pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:20.625173 kernel: audit: type=1300 audit(1707472758.412:949): arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe163ac20 a2=0 a3=ffff981256c0 items=0 ppid=2664 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:20.625196 kernel: audit: type=1327 audit(1707472758.412:949): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:20.625217 kernel: audit: type=1325 audit(1707472758.413:950): table=nat:100 family=2 entries=19 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:20.625242 kernel: audit: type=1300 audit(1707472758.413:950): arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe163ac20 a2=0 a3=ffff981256c0 items=0 ppid=2664 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:20.625261 kernel: audit: type=1327 audit(1707472758.413:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:18.412000 audit[3207]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:18.412000 audit[3207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffe163ac20 a2=0 a3=ffff981256c0 items=0 ppid=2664 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:18.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:18.413000 audit[3207]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=3207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:18.413000 audit[3207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffe163ac20 a2=0 a3=ffff981256c0 items=0 ppid=2664 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:18.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:20.625645 kubelet[2492]: E0209 09:59:18.180019 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:20.625645 kubelet[2492]: I0209 09:59:18.386102 2492 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 09:59:20.625645 kubelet[2492]: E0209 09:59:20.179906 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:22.179735 kubelet[2492]: E0209 09:59:22.179696 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:24.066014 env[1396]: time="2024-02-09T09:59:24.065949361Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:59:24.069354 systemd[1]: cri-containerd-8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49.scope: Deactivated successfully. Feb 9 09:59:24.073000 audit: BPF prog-id=142 op=UNLOAD Feb 9 09:59:24.086140 kernel: audit: type=1334 audit(1707472764.073:951): prog-id=142 op=UNLOAD Feb 9 09:59:24.097369 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49-rootfs.mount: Deactivated successfully. Feb 9 09:59:24.136428 kubelet[2492]: I0209 09:59:24.135659 2492 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:59:26.527659 kernel: audit: type=1400 audit(1707472765.262:952): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.527749 kernel: audit: type=1300 audit(1707472765.262:952): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400d977600 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:26.527771 kernel: audit: type=1327 audit(1707472765.262:952): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:26.527797 kernel: audit: type=1400 audit(1707472765.276:953): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.527817 kernel: audit: type=1300 audit(1707472765.276:953): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a5784e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:26.527836 kernel: audit: type=1327 audit(1707472765.276:953): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:26.527855 kernel: audit: type=1400 audit(1707472765.277:954): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.527876 kernel: audit: type=1300 audit(1707472765.277:954): arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a35cdb0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:26.527898 kernel: audit: type=1327 audit(1707472765.277:954): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.262000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.262000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400d977600 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.262000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.276000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.276000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a5784e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.277000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.277000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a35cdb0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.525000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a7035c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.525000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dff8620 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:25.525000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:25.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400a703620 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 09:59:25.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.170624 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.185503 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.186816 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.221697 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j9vxj\" (UniqueName: \"kubernetes.io/projected/1b6d7951-aa49-4451-91fd-195e425271d6-kube-api-access-j9vxj\") pod \"calico-kube-controllers-7c5b8c587-msd4t\" (UID: \"1b6d7951-aa49-4451-91fd-195e425271d6\") " pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.221750 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1b6d7951-aa49-4451-91fd-195e425271d6-tigera-ca-bundle\") pod \"calico-kube-controllers-7c5b8c587-msd4t\" (UID: \"1b6d7951-aa49-4451-91fd-195e425271d6\") " pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.221776 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n6gt7\" (UniqueName: \"kubernetes.io/projected/e8459746-414b-4022-8167-b28d75ed22ca-kube-api-access-n6gt7\") pod \"coredns-5d78c9869d-8qcp2\" (UID: \"e8459746-414b-4022-8167-b28d75ed22ca\") " pod="kube-system/coredns-5d78c9869d-8qcp2" Feb 9 09:59:26.528693 kubelet[2492]: I0209 09:59:24.221805 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/daf03352-b2f0-484b-911f-a0d30945b0e7-config-volume\") pod \"coredns-5d78c9869d-n68jh\" (UID: \"daf03352-b2f0-484b-911f-a0d30945b0e7\") " pod="kube-system/coredns-5d78c9869d-n68jh" Feb 9 09:59:24.175726 systemd[1]: Created slice kubepods-burstable-pode8459746_414b_4022_8167_b28d75ed22ca.slice. Feb 9 09:59:26.529294 kubelet[2492]: I0209 09:59:24.221884 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e8459746-414b-4022-8167-b28d75ed22ca-config-volume\") pod \"coredns-5d78c9869d-8qcp2\" (UID: \"e8459746-414b-4022-8167-b28d75ed22ca\") " pod="kube-system/coredns-5d78c9869d-8qcp2" Feb 9 09:59:26.529294 kubelet[2492]: I0209 09:59:24.221906 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qqwfp\" (UniqueName: \"kubernetes.io/projected/daf03352-b2f0-484b-911f-a0d30945b0e7-kube-api-access-qqwfp\") pod \"coredns-5d78c9869d-n68jh\" (UID: \"daf03352-b2f0-484b-911f-a0d30945b0e7\") " pod="kube-system/coredns-5d78c9869d-n68jh" Feb 9 09:59:24.183576 systemd[1]: Created slice kubepods-besteffort-pod481a078e_d96a_457e_bfcb_155d0b9aa028.slice. Feb 9 09:59:24.192650 systemd[1]: Created slice kubepods-besteffort-pod1b6d7951_aa49_4451_91fd_195e425271d6.slice. Feb 9 09:59:24.197881 systemd[1]: Created slice kubepods-burstable-poddaf03352_b2f0_484b_911f_a0d30945b0e7.slice. Feb 9 09:59:26.532899 env[1396]: time="2024-02-09T09:59:26.531472352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xk4kl,Uid:481a078e-d96a-457e-bfcb-155d0b9aa028,Namespace:calico-system,Attempt:0,}" Feb 9 09:59:26.533439 kubelet[2492]: E0209 09:59:26.533417 2492 kubelet.go:2431] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.354s" Feb 9 09:59:26.541000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.541000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400293e930 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:26.541000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:26.543000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:26.543000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028d2200 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:26.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:26.833813 env[1396]: time="2024-02-09T09:59:26.833696557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8qcp2,Uid:e8459746-414b-4022-8167-b28d75ed22ca,Namespace:kube-system,Attempt:0,}" Feb 9 09:59:26.834607 env[1396]: time="2024-02-09T09:59:26.834495548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5b8c587-msd4t,Uid:1b6d7951-aa49-4451-91fd-195e425271d6,Namespace:calico-system,Attempt:0,}" Feb 9 09:59:26.836546 env[1396]: time="2024-02-09T09:59:26.836364808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-n68jh,Uid:daf03352-b2f0-484b-911f-a0d30945b0e7,Namespace:kube-system,Attempt:0,}" Feb 9 09:59:28.575881 env[1396]: time="2024-02-09T09:59:28.575813787Z" level=info msg="shim disconnected" id=8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49 Feb 9 09:59:28.575881 env[1396]: time="2024-02-09T09:59:28.575873107Z" level=warning msg="cleaning up after shim disconnected" id=8c9404c4b561b8749b011c4d25516ffeca1acd1b8010a14af9dac74a5b944a49 namespace=k8s.io Feb 9 09:59:28.575881 env[1396]: time="2024-02-09T09:59:28.575884426Z" level=info msg="cleaning up dead shim" Feb 9 09:59:28.584794 env[1396]: time="2024-02-09T09:59:28.584740094Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:59:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3238 runtime=io.containerd.runc.v2\n" Feb 9 09:59:28.780843 env[1396]: time="2024-02-09T09:59:28.780763079Z" level=error msg="Failed to destroy network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.781443 env[1396]: time="2024-02-09T09:59:28.781389992Z" level=error msg="encountered an error cleaning up failed sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.781560 env[1396]: time="2024-02-09T09:59:28.781466231Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5b8c587-msd4t,Uid:1b6d7951-aa49-4451-91fd-195e425271d6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.781761 kubelet[2492]: E0209 09:59:28.781721 2492 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.782036 kubelet[2492]: E0209 09:59:28.781788 2492 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" Feb 9 09:59:28.782036 kubelet[2492]: E0209 09:59:28.781808 2492 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" Feb 9 09:59:28.782036 kubelet[2492]: E0209 09:59:28.781863 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7c5b8c587-msd4t_calico-system(1b6d7951-aa49-4451-91fd-195e425271d6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7c5b8c587-msd4t_calico-system(1b6d7951-aa49-4451-91fd-195e425271d6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" podUID=1b6d7951-aa49-4451-91fd-195e425271d6 Feb 9 09:59:28.811404 env[1396]: time="2024-02-09T09:59:28.811333398Z" level=error msg="Failed to destroy network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.811892 env[1396]: time="2024-02-09T09:59:28.811845473Z" level=error msg="encountered an error cleaning up failed sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.811966 env[1396]: time="2024-02-09T09:59:28.811919472Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xk4kl,Uid:481a078e-d96a-457e-bfcb-155d0b9aa028,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.812606 kubelet[2492]: E0209 09:59:28.812210 2492 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.812606 kubelet[2492]: E0209 09:59:28.812270 2492 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:59:28.812606 kubelet[2492]: E0209 09:59:28.812290 2492 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xk4kl" Feb 9 09:59:28.812806 kubelet[2492]: E0209 09:59:28.812346 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xk4kl_calico-system(481a078e-d96a-457e-bfcb-155d0b9aa028)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xk4kl_calico-system(481a078e-d96a-457e-bfcb-155d0b9aa028)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:28.853311 env[1396]: time="2024-02-09T09:59:28.853187919Z" level=error msg="Failed to destroy network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.854167 env[1396]: time="2024-02-09T09:59:28.854117669Z" level=error msg="encountered an error cleaning up failed sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.854332 env[1396]: time="2024-02-09T09:59:28.854304228Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8qcp2,Uid:e8459746-414b-4022-8167-b28d75ed22ca,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.855285 kubelet[2492]: E0209 09:59:28.854642 2492 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.855285 kubelet[2492]: E0209 09:59:28.854699 2492 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8qcp2" Feb 9 09:59:28.855285 kubelet[2492]: E0209 09:59:28.854729 2492 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8qcp2" Feb 9 09:59:28.855504 kubelet[2492]: E0209 09:59:28.854779 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-8qcp2_kube-system(e8459746-414b-4022-8167-b28d75ed22ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-8qcp2_kube-system(e8459746-414b-4022-8167-b28d75ed22ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8qcp2" podUID=e8459746-414b-4022-8167-b28d75ed22ca Feb 9 09:59:28.874315 env[1396]: time="2024-02-09T09:59:28.874235739Z" level=error msg="Failed to destroy network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.874722 env[1396]: time="2024-02-09T09:59:28.874683374Z" level=error msg="encountered an error cleaning up failed sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.874787 env[1396]: time="2024-02-09T09:59:28.874758813Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-n68jh,Uid:daf03352-b2f0-484b-911f-a0d30945b0e7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.877298 kubelet[2492]: E0209 09:59:28.875118 2492 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:28.877298 kubelet[2492]: E0209 09:59:28.875192 2492 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-n68jh" Feb 9 09:59:28.877298 kubelet[2492]: E0209 09:59:28.875212 2492 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-n68jh" Feb 9 09:59:28.878193 kubelet[2492]: E0209 09:59:28.875274 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-n68jh_kube-system(daf03352-b2f0-484b-911f-a0d30945b0e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-n68jh_kube-system(daf03352-b2f0-484b-911f-a0d30945b0e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-n68jh" podUID=daf03352-b2f0-484b-911f-a0d30945b0e7 Feb 9 09:59:29.346027 kubelet[2492]: I0209 09:59:29.346000 2492 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:29.347173 env[1396]: time="2024-02-09T09:59:29.347129377Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 09:59:29.348620 kubelet[2492]: I0209 09:59:29.348534 2492 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:29.349045 env[1396]: time="2024-02-09T09:59:29.349010917Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 09:59:29.351808 kubelet[2492]: I0209 09:59:29.351777 2492 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:29.354320 env[1396]: time="2024-02-09T09:59:29.354273943Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 09:59:29.366762 env[1396]: time="2024-02-09T09:59:29.366418577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:59:29.367916 kubelet[2492]: I0209 09:59:29.367890 2492 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:29.370379 env[1396]: time="2024-02-09T09:59:29.370122618Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 09:59:29.405628 env[1396]: time="2024-02-09T09:59:29.405556051Z" level=error msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" failed" error="failed to destroy network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:29.408563 kubelet[2492]: E0209 09:59:29.408373 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:29.408563 kubelet[2492]: E0209 09:59:29.408433 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f} Feb 9 09:59:29.408563 kubelet[2492]: E0209 09:59:29.408479 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"daf03352-b2f0-484b-911f-a0d30945b0e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:29.408563 kubelet[2492]: E0209 09:59:29.408509 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"daf03352-b2f0-484b-911f-a0d30945b0e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-n68jh" podUID=daf03352-b2f0-484b-911f-a0d30945b0e7 Feb 9 09:59:29.426513 env[1396]: time="2024-02-09T09:59:29.426455914Z" level=error msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" failed" error="failed to destroy network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:29.427223 kubelet[2492]: E0209 09:59:29.426940 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:29.427223 kubelet[2492]: E0209 09:59:29.426993 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6} Feb 9 09:59:29.427223 kubelet[2492]: E0209 09:59:29.427027 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1b6d7951-aa49-4451-91fd-195e425271d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:29.427223 kubelet[2492]: E0209 09:59:29.427070 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1b6d7951-aa49-4451-91fd-195e425271d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" podUID=1b6d7951-aa49-4451-91fd-195e425271d6 Feb 9 09:59:29.441190 env[1396]: time="2024-02-09T09:59:29.441125361Z" level=error msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" failed" error="failed to destroy network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:29.441715 kubelet[2492]: E0209 09:59:29.441550 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:29.441715 kubelet[2492]: E0209 09:59:29.441595 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d} Feb 9 09:59:29.441715 kubelet[2492]: E0209 09:59:29.441645 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"481a078e-d96a-457e-bfcb-155d0b9aa028\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:29.441715 kubelet[2492]: E0209 09:59:29.441673 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"481a078e-d96a-457e-bfcb-155d0b9aa028\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:29.445722 env[1396]: time="2024-02-09T09:59:29.445661354Z" level=error msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" failed" error="failed to destroy network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:29.446202 kubelet[2492]: E0209 09:59:29.446038 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:29.446202 kubelet[2492]: E0209 09:59:29.446101 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70} Feb 9 09:59:29.446202 kubelet[2492]: E0209 09:59:29.446140 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8459746-414b-4022-8167-b28d75ed22ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:29.446202 kubelet[2492]: E0209 09:59:29.446178 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8459746-414b-4022-8167-b28d75ed22ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8qcp2" podUID=e8459746-414b-4022-8167-b28d75ed22ca Feb 9 09:59:29.693466 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70-shm.mount: Deactivated successfully. Feb 9 09:59:29.693558 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d-shm.mount: Deactivated successfully. Feb 9 09:59:29.693611 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6-shm.mount: Deactivated successfully. Feb 9 09:59:38.294032 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2576560134.mount: Deactivated successfully. Feb 9 09:59:40.180461 env[1396]: time="2024-02-09T09:59:40.180415916Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 09:59:40.180965 env[1396]: time="2024-02-09T09:59:40.180470196Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 09:59:40.181206 env[1396]: time="2024-02-09T09:59:40.180415956Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 09:59:40.226214 env[1396]: time="2024-02-09T09:59:40.226127846Z" level=error msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" failed" error="failed to destroy network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.227330 kubelet[2492]: E0209 09:59:40.226515 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:40.227330 kubelet[2492]: E0209 09:59:40.226557 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d} Feb 9 09:59:40.227330 kubelet[2492]: E0209 09:59:40.226591 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"481a078e-d96a-457e-bfcb-155d0b9aa028\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:40.227330 kubelet[2492]: E0209 09:59:40.226618 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"481a078e-d96a-457e-bfcb-155d0b9aa028\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xk4kl" podUID=481a078e-d96a-457e-bfcb-155d0b9aa028 Feb 9 09:59:40.233382 env[1396]: time="2024-02-09T09:59:40.233318658Z" level=error msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" failed" error="failed to destroy network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.233683 kubelet[2492]: E0209 09:59:40.233651 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:40.233743 kubelet[2492]: E0209 09:59:40.233712 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70} Feb 9 09:59:40.233773 kubelet[2492]: E0209 09:59:40.233745 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8459746-414b-4022-8167-b28d75ed22ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:40.233773 kubelet[2492]: E0209 09:59:40.233772 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8459746-414b-4022-8167-b28d75ed22ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8qcp2" podUID=e8459746-414b-4022-8167-b28d75ed22ca Feb 9 09:59:40.235840 env[1396]: time="2024-02-09T09:59:40.235786435Z" level=error msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" failed" error="failed to destroy network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.236111 kubelet[2492]: E0209 09:59:40.236086 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:40.236163 kubelet[2492]: E0209 09:59:40.236140 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6} Feb 9 09:59:40.236192 kubelet[2492]: E0209 09:59:40.236174 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1b6d7951-aa49-4451-91fd-195e425271d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:40.236247 kubelet[2492]: E0209 09:59:40.236205 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1b6d7951-aa49-4451-91fd-195e425271d6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" podUID=1b6d7951-aa49-4451-91fd-195e425271d6 Feb 9 09:59:44.807000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.813230 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 9 09:59:44.813379 kernel: audit: type=1400 audit(1707472784.807:960): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.807000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028d2ba0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:44.876875 kernel: audit: type=1300 audit(1707472784.807:960): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028d2ba0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:44.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:44.906302 kernel: audit: type=1327 audit(1707472784.807:960): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:44.906454 kernel: audit: type=1400 audit(1707472784.809:961): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002965540 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:46.369907 kernel: audit: type=1300 audit(1707472784.809:961): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002965540 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:46.370115 kernel: audit: type=1327 audit(1707472784.809:961): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:46.370197 kernel: audit: type=1400 audit(1707472784.809:962): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:46.370230 kernel: audit: type=1300 audit(1707472784.809:962): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002965560 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:46.370251 kernel: audit: type=1327 audit(1707472784.809:962): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:46.370271 kernel: audit: type=1400 audit(1707472784.809:963): avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002965560 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 09:59:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028d2bc0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 09:59:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 09:59:46.370778 env[1396]: time="2024-02-09T09:59:45.180162599Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 09:59:46.370778 env[1396]: time="2024-02-09T09:59:45.208065306Z" level=error msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" failed" error="failed to destroy network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:46.371203 kubelet[2492]: E0209 09:59:45.208461 2492 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:46.371203 kubelet[2492]: E0209 09:59:45.208511 2492 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f} Feb 9 09:59:46.371203 kubelet[2492]: E0209 09:59:45.208556 2492 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"daf03352-b2f0-484b-911f-a0d30945b0e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:46.371203 kubelet[2492]: E0209 09:59:45.208585 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"daf03352-b2f0-484b-911f-a0d30945b0e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-n68jh" podUID=daf03352-b2f0-484b-911f-a0d30945b0e7 Feb 9 09:59:46.527933 env[1396]: time="2024-02-09T09:59:46.527889718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:46.571002 env[1396]: time="2024-02-09T09:59:46.570939089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:46.618017 env[1396]: time="2024-02-09T09:59:46.617956386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:46.662806 env[1396]: time="2024-02-09T09:59:46.662557303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:46.663704 env[1396]: time="2024-02-09T09:59:46.663663293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 09:59:46.679423 env[1396]: time="2024-02-09T09:59:46.679382032Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:59:46.834970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount269051158.mount: Deactivated successfully. Feb 9 09:59:46.963777 env[1396]: time="2024-02-09T09:59:46.963682709Z" level=info msg="CreateContainer within sandbox \"f2e8772ba8aa9498d5c93880d47065fa947535ce97eec2049c2142d4952b800d\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466\"" Feb 9 09:59:46.965363 env[1396]: time="2024-02-09T09:59:46.964320783Z" level=info msg="StartContainer for \"854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466\"" Feb 9 09:59:46.987637 systemd[1]: Started cri-containerd-854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466.scope. Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2934 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:47.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835346564666634373431326138346434663761303236393630663663 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.008000 audit: BPF prog-id=143 op=LOAD Feb 9 09:59:47.008000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2934 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:47.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835346564666634373431326138346434663761303236393630663663 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.009000 audit: BPF prog-id=144 op=LOAD Feb 9 09:59:47.009000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2934 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:47.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835346564666634373431326138346434663761303236393630663663 Feb 9 09:59:47.010000 audit: BPF prog-id=144 op=UNLOAD Feb 9 09:59:47.010000 audit: BPF prog-id=143 op=UNLOAD Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:47.010000 audit: BPF prog-id=145 op=LOAD Feb 9 09:59:47.010000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2934 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:47.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835346564666634373431326138346434663761303236393630663663 Feb 9 09:59:47.038171 env[1396]: time="2024-02-09T09:59:47.038105600Z" level=info msg="StartContainer for \"854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466\" returns successfully" Feb 9 09:59:47.360733 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:59:47.360978 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:59:48.426607 systemd[1]: run-containerd-runc-k8s.io-854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466-runc.mueKpn.mount: Deactivated successfully. Feb 9 09:59:48.754000 audit[3696]: AVC avc: denied { write } for pid=3696 comm="tee" name="fd" dev="proc" ino=26151 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.754000 audit[3696]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe83ee962 a2=241 a3=1b6 items=1 ppid=3659 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.754000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:59:48.754000 audit: PATH item=0 name="/dev/fd/63" inode=26144 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.754000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.762000 audit[3688]: AVC avc: denied { write } for pid=3688 comm="tee" name="fd" dev="proc" ino=26936 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.762000 audit[3688]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeae47973 a2=241 a3=1b6 items=1 ppid=3656 pid=3688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.762000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:59:48.762000 audit: PATH item=0 name="/dev/fd/63" inode=26914 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.765000 audit[3704]: AVC avc: denied { write } for pid=3704 comm="tee" name="fd" dev="proc" ino=26163 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.765000 audit[3708]: AVC avc: denied { write } for pid=3708 comm="tee" name="fd" dev="proc" ino=26166 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.765000 audit[3708]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffebc5e971 a2=241 a3=1b6 items=1 ppid=3653 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.765000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:59:48.765000 audit: PATH item=0 name="/dev/fd/63" inode=26150 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.765000 audit[3704]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd57ff971 a2=241 a3=1b6 items=1 ppid=3661 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.765000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:59:48.765000 audit: PATH item=0 name="/dev/fd/63" inode=26147 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.779000 audit[3715]: AVC avc: denied { write } for pid=3715 comm="tee" name="fd" dev="proc" ino=26174 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.780000 audit[3717]: AVC avc: denied { write } for pid=3717 comm="tee" name="fd" dev="proc" ino=26177 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.780000 audit[3717]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc094d972 a2=241 a3=1b6 items=1 ppid=3652 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.794000 audit[3719]: AVC avc: denied { write } for pid=3719 comm="tee" name="fd" dev="proc" ino=26181 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:48.780000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:59:48.780000 audit: PATH item=0 name="/dev/fd/63" inode=26943 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.780000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.779000 audit[3715]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe255a961 a2=241 a3=1b6 items=1 ppid=3673 pid=3715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.779000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:59:48.779000 audit: PATH item=0 name="/dev/fd/63" inode=26942 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.779000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:48.794000 audit[3719]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd2b71971 a2=241 a3=1b6 items=1 ppid=3664 pid=3719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:48.794000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:59:48.794000 audit: PATH item=0 name="/dev/fd/63" inode=26944 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:48.794000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit: BPF prog-id=146 op=LOAD Feb 9 09:59:49.160000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef781a58 a2=70 a3=0 items=0 ppid=3669 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:49.160000 audit: BPF prog-id=146 op=UNLOAD Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.160000 audit: BPF prog-id=147 op=LOAD Feb 9 09:59:49.160000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef781a58 a2=70 a3=4a174c items=0 ppid=3669 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.160000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:49.161000 audit: BPF prog-id=147 op=UNLOAD Feb 9 09:59:49.161000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.161000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffef781a88 a2=70 a3=2454e79f items=0 ppid=3669 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.161000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.162000 audit: BPF prog-id=148 op=LOAD Feb 9 09:59:49.162000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffef7819d8 a2=70 a3=2454e7b9 items=0 ppid=3669 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.162000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:49.170000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.170000 audit[3797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb8c09d8 a2=70 a3=0 items=0 ppid=3669 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.170000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:59:49.171000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:49.171000 audit[3797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb8c08b8 a2=70 a3=2 items=0 ppid=3669 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.171000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:59:49.186000 audit: BPF prog-id=148 op=UNLOAD Feb 9 09:59:49.343000 audit[3821]: NETFILTER_CFG table=mangle:101 family=2 entries=19 op=nft_register_chain pid=3821 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:49.343000 audit[3821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffff3f69460 a2=0 a3=ffff944eafa8 items=0 ppid=3669 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:49.351000 audit[3820]: NETFILTER_CFG table=raw:102 family=2 entries=19 op=nft_register_chain pid=3820 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:49.351000 audit[3820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe4dae960 a2=0 a3=ffffb62a1fa8 items=0 ppid=3669 pid=3820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:49.351000 audit[3822]: NETFILTER_CFG table=nat:103 family=2 entries=16 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:49.351000 audit[3822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffda08baf0 a2=0 a3=ffffbe3c0fa8 items=0 ppid=3669 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:49.353000 audit[3824]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:49.353000 audit[3824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffcbbba830 a2=0 a3=ffff98378fa8 items=0 ppid=3669 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:49.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:51.180428 env[1396]: time="2024-02-09T09:59:51.180373518Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 09:59:51.239994 kubelet[2492]: I0209 09:59:51.239547 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-q2w2m" podStartSLOduration=5.137780404 podCreationTimestamp="2024-02-09 09:58:52 +0000 UTC" firstStartedPulling="2024-02-09 09:58:52.562253453 +0000 UTC m=+21.632883327" lastFinishedPulling="2024-02-09 09:59:46.663979171 +0000 UTC m=+75.734609045" observedRunningTime="2024-02-09 09:59:47.439876761 +0000 UTC m=+76.510506635" watchObservedRunningTime="2024-02-09 09:59:51.239506122 +0000 UTC m=+80.310135996" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.240 [INFO][3848] k8s.go 578: Cleaning up netns ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.240 [INFO][3848] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" iface="eth0" netns="/var/run/netns/cni-4e895e6f-a1ff-eb58-6881-7f59987dbb69" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.241 [INFO][3848] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" iface="eth0" netns="/var/run/netns/cni-4e895e6f-a1ff-eb58-6881-7f59987dbb69" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.241 [INFO][3848] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" iface="eth0" netns="/var/run/netns/cni-4e895e6f-a1ff-eb58-6881-7f59987dbb69" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.241 [INFO][3848] k8s.go 585: Releasing IP address(es) ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.241 [INFO][3848] utils.go 188: Calico CNI releasing IP address ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.260 [INFO][3855] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.260 [INFO][3855] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.260 [INFO][3855] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.270 [WARNING][3855] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.270 [INFO][3855] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.272 [INFO][3855] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:51.276766 env[1396]: 2024-02-09 09:59:51.274 [INFO][3848] k8s.go 591: Teardown processing complete. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 09:59:51.279362 systemd[1]: run-netns-cni\x2d4e895e6f\x2da1ff\x2deb58\x2d6881\x2d7f59987dbb69.mount: Deactivated successfully. Feb 9 09:59:51.282271 env[1396]: time="2024-02-09T09:59:51.282216429Z" level=info msg="TearDown network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" successfully" Feb 9 09:59:51.282271 env[1396]: time="2024-02-09T09:59:51.282268308Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" returns successfully" Feb 9 09:59:51.283050 env[1396]: time="2024-02-09T09:59:51.282997422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8qcp2,Uid:e8459746-414b-4022-8167-b28d75ed22ca,Namespace:kube-system,Attempt:1,}" Feb 9 09:59:53.033669 systemd-networkd[1512]: vxlan.calico: Link UP Feb 9 09:59:53.033676 systemd-networkd[1512]: vxlan.calico: Gained carrier Feb 9 09:59:53.182634 env[1396]: time="2024-02-09T09:59:53.182578015Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.250 [INFO][3880] k8s.go 578: Cleaning up netns ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.251 [INFO][3880] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" iface="eth0" netns="/var/run/netns/cni-c2fe960c-d4ff-7147-b869-227c8cbe615a" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.251 [INFO][3880] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" iface="eth0" netns="/var/run/netns/cni-c2fe960c-d4ff-7147-b869-227c8cbe615a" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.251 [INFO][3880] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" iface="eth0" netns="/var/run/netns/cni-c2fe960c-d4ff-7147-b869-227c8cbe615a" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.251 [INFO][3880] k8s.go 585: Releasing IP address(es) ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.251 [INFO][3880] utils.go 188: Calico CNI releasing IP address ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.276 [INFO][3886] ipam_plugin.go 415: Releasing address using handleID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.276 [INFO][3886] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.276 [INFO][3886] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.290 [WARNING][3886] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.290 [INFO][3886] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.292 [INFO][3886] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:53.296094 env[1396]: 2024-02-09 09:59:53.294 [INFO][3880] k8s.go 591: Teardown processing complete. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 09:59:53.299259 env[1396]: time="2024-02-09T09:59:53.298530774Z" level=info msg="TearDown network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" successfully" Feb 9 09:59:53.299259 env[1396]: time="2024-02-09T09:59:53.298575054Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" returns successfully" Feb 9 09:59:53.298040 systemd[1]: run-netns-cni\x2dc2fe960c\x2dd4ff\x2d7147\x2db869\x2d227c8cbe615a.mount: Deactivated successfully. Feb 9 09:59:53.300217 env[1396]: time="2024-02-09T09:59:53.300177920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5b8c587-msd4t,Uid:1b6d7951-aa49-4451-91fd-195e425271d6,Namespace:calico-system,Attempt:1,}" Feb 9 09:59:53.463311 systemd-networkd[1512]: cali02a20ef68c7: Link UP Feb 9 09:59:53.479170 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:59:53.479308 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali02a20ef68c7: link becomes ready Feb 9 09:59:53.480856 systemd-networkd[1512]: cali02a20ef68c7: Gained carrier Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.370 [INFO][3893] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0 coredns-5d78c9869d- kube-system e8459746-414b-4022-8167-b28d75ed22ca 788 0 2024-02-09 09:58:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 coredns-5d78c9869d-8qcp2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali02a20ef68c7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.370 [INFO][3893] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.400 [INFO][3904] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" HandleID="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.422 [INFO][3904] ipam_plugin.go 268: Auto assigning IP ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" HandleID="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025f240), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-ee2552a568", "pod":"coredns-5d78c9869d-8qcp2", "timestamp":"2024-02-09 09:59:53.400615852 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.422 [INFO][3904] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.422 [INFO][3904] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.422 [INFO][3904] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.424 [INFO][3904] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.431 [INFO][3904] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.437 [INFO][3904] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.439 [INFO][3904] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.441 [INFO][3904] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.441 [INFO][3904] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.443 [INFO][3904] ipam.go 1682: Creating new handle: k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71 Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.447 [INFO][3904] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.455 [INFO][3904] ipam.go 1216: Successfully claimed IPs: [192.168.99.65/26] block=192.168.99.64/26 handle="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.456 [INFO][3904] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.65/26] handle="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.456 [INFO][3904] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:53.493775 env[1396]: 2024-02-09 09:59:53.456 [INFO][3904] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.65/26] IPv6=[] ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" HandleID="k8s-pod-network.3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.457 [INFO][3893] k8s.go 385: Populated endpoint ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e8459746-414b-4022-8167-b28d75ed22ca", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"coredns-5d78c9869d-8qcp2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02a20ef68c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.458 [INFO][3893] k8s.go 386: Calico CNI using IPs: [192.168.99.65/32] ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.458 [INFO][3893] dataplane_linux.go 68: Setting the host side veth name to cali02a20ef68c7 ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.480 [INFO][3893] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.481 [INFO][3893] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e8459746-414b-4022-8167-b28d75ed22ca", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71", Pod:"coredns-5d78c9869d-8qcp2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02a20ef68c7", MAC:"72:26:ea:2f:66:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:53.494379 env[1396]: 2024-02-09 09:59:53.491 [INFO][3893] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71" Namespace="kube-system" Pod="coredns-5d78c9869d-8qcp2" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 09:59:53.519000 audit[3926]: NETFILTER_CFG table=filter:105 family=2 entries=36 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:53.525565 kernel: kauditd_printk_skb: 141 callbacks suppressed Feb 9 09:59:53.525658 kernel: audit: type=1325 audit(1707472793.519:990): table=filter:105 family=2 entries=36 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:53.519000 audit[3926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff18b0580 a2=0 a3=ffff80cb2fa8 items=0 ppid=3669 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.586614 kernel: audit: type=1300 audit(1707472793.519:990): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=fffff18b0580 a2=0 a3=ffff80cb2fa8 items=0 ppid=3669 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.519000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:53.608441 kernel: audit: type=1327 audit(1707472793.519:990): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:53.640683 env[1396]: time="2024-02-09T09:59:53.640283782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:53.640683 env[1396]: time="2024-02-09T09:59:53.640349982Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:53.640683 env[1396]: time="2024-02-09T09:59:53.640360782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:53.640683 env[1396]: time="2024-02-09T09:59:53.640526300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71 pid=3934 runtime=io.containerd.runc.v2 Feb 9 09:59:53.678636 systemd[1]: Started cri-containerd-3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71.scope. Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.737442 kernel: audit: type=1400 audit(1707472793.693:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.737607 kernel: audit: type=1400 audit(1707472793.693:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.760338 kernel: audit: type=1400 audit(1707472793.693:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.781733 kernel: audit: type=1400 audit(1707472793.693:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.803198 kernel: audit: type=1400 audit(1707472793.693:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.824307 kernel: audit: type=1400 audit(1707472793.693:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.825097 kernel: audit: type=1400 audit(1707472793.693:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.693000 audit: BPF prog-id=149 op=LOAD Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3934 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343764333134616135663530343633393834613635306266653332 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3934 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343764333134616135663530343633393834613635306266653332 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit: BPF prog-id=150 op=LOAD Feb 9 09:59:53.714000 audit[3943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3934 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343764333134616135663530343633393834613635306266653332 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit: BPF prog-id=151 op=LOAD Feb 9 09:59:53.714000 audit[3943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3934 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343764333134616135663530343633393834613635306266653332 Feb 9 09:59:53.714000 audit: BPF prog-id=151 op=UNLOAD Feb 9 09:59:53.714000 audit: BPF prog-id=150 op=UNLOAD Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.714000 audit: BPF prog-id=152 op=LOAD Feb 9 09:59:53.714000 audit[3943]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3934 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361343764333134616135663530343633393834613635306266653332 Feb 9 09:59:53.891440 env[1396]: time="2024-02-09T09:59:53.891396254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8qcp2,Uid:e8459746-414b-4022-8167-b28d75ed22ca,Namespace:kube-system,Attempt:1,} returns sandbox id \"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71\"" Feb 9 09:59:53.898273 env[1396]: time="2024-02-09T09:59:53.898227035Z" level=info msg="CreateContainer within sandbox \"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:59:53.942163 env[1396]: time="2024-02-09T09:59:53.942103696Z" level=info msg="CreateContainer within sandbox \"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3bdb7ec1a6b5ae17d5230660ac330b99fe73638da1ff8f3d59d1f7c176057552\"" Feb 9 09:59:53.942663 env[1396]: time="2024-02-09T09:59:53.942634131Z" level=info msg="StartContainer for \"3bdb7ec1a6b5ae17d5230660ac330b99fe73638da1ff8f3d59d1f7c176057552\"" Feb 9 09:59:53.970972 systemd[1]: Started cri-containerd-3bdb7ec1a6b5ae17d5230660ac330b99fe73638da1ff8f3d59d1f7c176057552.scope. Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.994000 audit: BPF prog-id=153 op=LOAD Feb 9 09:59:53.995000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.995000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3934 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362646237656331613662356165313764353233303636306163333330 Feb 9 09:59:53.995000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.995000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3934 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362646237656331613662356165313764353233303636306163333330 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit: BPF prog-id=154 op=LOAD Feb 9 09:59:53.996000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3934 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362646237656331613662356165313764353233303636306163333330 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit: BPF prog-id=155 op=LOAD Feb 9 09:59:53.996000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3934 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362646237656331613662356165313764353233303636306163333330 Feb 9 09:59:53.996000 audit: BPF prog-id=155 op=UNLOAD Feb 9 09:59:53.996000 audit: BPF prog-id=154 op=UNLOAD Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.996000 audit: BPF prog-id=156 op=LOAD Feb 9 09:59:53.996000 audit[3992]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3934 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362646237656331613662356165313764353233303636306163333330 Feb 9 09:59:54.019633 env[1396]: time="2024-02-09T09:59:54.019571428Z" level=info msg="StartContainer for \"3bdb7ec1a6b5ae17d5230660ac330b99fe73638da1ff8f3d59d1f7c176057552\" returns successfully" Feb 9 09:59:54.051196 systemd-networkd[1512]: califd2b50b5ce2: Link UP Feb 9 09:59:54.061133 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califd2b50b5ce2: link becomes ready Feb 9 09:59:54.061254 systemd-networkd[1512]: califd2b50b5ce2: Gained carrier Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.803 [INFO][3944] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0 calico-kube-controllers-7c5b8c587- calico-system 1b6d7951-aa49-4451-91fd-195e425271d6 794 0 2024-02-09 09:58:52 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7c5b8c587 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 calico-kube-controllers-7c5b8c587-msd4t eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califd2b50b5ce2 [] []}} ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.804 [INFO][3944] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.928 [INFO][3977] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" HandleID="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.953 [INFO][3977] ipam_plugin.go 268: Auto assigning IP ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" HandleID="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002036f0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-ee2552a568", "pod":"calico-kube-controllers-7c5b8c587-msd4t", "timestamp":"2024-02-09 09:59:53.927898739 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.953 [INFO][3977] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.953 [INFO][3977] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.953 [INFO][3977] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.955 [INFO][3977] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:53.977 [INFO][3977] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.007 [INFO][3977] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.010 [INFO][3977] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.014 [INFO][3977] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.015 [INFO][3977] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.017 [INFO][3977] ipam.go 1682: Creating new handle: k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025 Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.023 [INFO][3977] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.033 [INFO][3977] ipam.go 1216: Successfully claimed IPs: [192.168.99.66/26] block=192.168.99.64/26 handle="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.033 [INFO][3977] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.66/26] handle="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.033 [INFO][3977] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:54.071989 env[1396]: 2024-02-09 09:59:54.033 [INFO][3977] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.66/26] IPv6=[] ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" HandleID="k8s-pod-network.630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.035 [INFO][3944] k8s.go 385: Populated endpoint ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0", GenerateName:"calico-kube-controllers-7c5b8c587-", Namespace:"calico-system", SelfLink:"", UID:"1b6d7951-aa49-4451-91fd-195e425271d6", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5b8c587", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"calico-kube-controllers-7c5b8c587-msd4t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd2b50b5ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.035 [INFO][3944] k8s.go 386: Calico CNI using IPs: [192.168.99.66/32] ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.035 [INFO][3944] dataplane_linux.go 68: Setting the host side veth name to califd2b50b5ce2 ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.048 [INFO][3944] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.048 [INFO][3944] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0", GenerateName:"calico-kube-controllers-7c5b8c587-", Namespace:"calico-system", SelfLink:"", UID:"1b6d7951-aa49-4451-91fd-195e425271d6", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5b8c587", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025", Pod:"calico-kube-controllers-7c5b8c587-msd4t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd2b50b5ce2", MAC:"12:65:dc:71:20:39", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:54.072644 env[1396]: 2024-02-09 09:59:54.070 [INFO][3944] k8s.go 491: Wrote updated endpoint to datastore ContainerID="630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025" Namespace="calico-system" Pod="calico-kube-controllers-7c5b8c587-msd4t" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 09:59:54.110454 env[1396]: time="2024-02-09T09:59:54.108495024Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:54.110454 env[1396]: time="2024-02-09T09:59:54.108540064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:54.110454 env[1396]: time="2024-02-09T09:59:54.108549984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:54.110877 env[1396]: time="2024-02-09T09:59:54.110811844Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025 pid=4041 runtime=io.containerd.runc.v2 Feb 9 09:59:54.125887 systemd[1]: Started cri-containerd-630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025.scope. Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.151000 audit: BPF prog-id=157 op=LOAD Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4041 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633306630326135646336663339623333333736356137653761353736 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4041 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633306630326135646336663339623333333736356137653761353736 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit: BPF prog-id=158 op=LOAD Feb 9 09:59:54.152000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4041 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633306630326135646336663339623333333736356137653761353736 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit: BPF prog-id=159 op=LOAD Feb 9 09:59:54.152000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4041 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633306630326135646336663339623333333736356137653761353736 Feb 9 09:59:54.152000 audit: BPF prog-id=159 op=UNLOAD Feb 9 09:59:54.152000 audit: BPF prog-id=158 op=UNLOAD Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.152000 audit: BPF prog-id=160 op=LOAD Feb 9 09:59:54.152000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4041 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633306630326135646336663339623333333736356137653761353736 Feb 9 09:59:54.174000 audit[4072]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=4072 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.182404 env[1396]: time="2024-02-09T09:59:54.182293110Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 09:59:54.174000 audit[4072]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffded84f10 a2=0 a3=ffffb3d30fa8 items=0 ppid=3669 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.198049 env[1396]: time="2024-02-09T09:59:54.197997375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7c5b8c587-msd4t,Uid:1b6d7951-aa49-4451-91fd-195e425271d6,Namespace:calico-system,Attempt:1,} returns sandbox id \"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025\"" Feb 9 09:59:54.202463 env[1396]: time="2024-02-09T09:59:54.202411657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.263 [INFO][4094] k8s.go 578: Cleaning up netns ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.263 [INFO][4094] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" iface="eth0" netns="/var/run/netns/cni-e87d5da2-6413-f527-63f2-c30249f390cd" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.263 [INFO][4094] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" iface="eth0" netns="/var/run/netns/cni-e87d5da2-6413-f527-63f2-c30249f390cd" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.263 [INFO][4094] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" iface="eth0" netns="/var/run/netns/cni-e87d5da2-6413-f527-63f2-c30249f390cd" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.264 [INFO][4094] k8s.go 585: Releasing IP address(es) ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.264 [INFO][4094] utils.go 188: Calico CNI releasing IP address ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.294 [INFO][4100] ipam_plugin.go 415: Releasing address using handleID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.294 [INFO][4100] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.294 [INFO][4100] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.306 [WARNING][4100] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.306 [INFO][4100] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.308 [INFO][4100] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:54.317246 env[1396]: 2024-02-09 09:59:54.311 [INFO][4094] k8s.go 591: Teardown processing complete. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 09:59:54.319820 systemd[1]: run-netns-cni\x2de87d5da2\x2d6413\x2df527\x2d63f2\x2dc30249f390cd.mount: Deactivated successfully. Feb 9 09:59:54.321201 env[1396]: time="2024-02-09T09:59:54.321151838Z" level=info msg="TearDown network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" successfully" Feb 9 09:59:54.321331 env[1396]: time="2024-02-09T09:59:54.321314036Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" returns successfully" Feb 9 09:59:54.322137 env[1396]: time="2024-02-09T09:59:54.322103669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xk4kl,Uid:481a078e-d96a-457e-bfcb-155d0b9aa028,Namespace:calico-system,Attempt:1,}" Feb 9 09:59:54.437257 systemd-networkd[1512]: vxlan.calico: Gained IPv6LL Feb 9 09:59:54.461179 kubelet[2492]: I0209 09:59:54.460824 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-8qcp2" podStartSLOduration=69.460783118 podCreationTimestamp="2024-02-09 09:58:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:59:54.437485118 +0000 UTC m=+83.508114992" watchObservedRunningTime="2024-02-09 09:59:54.460783118 +0000 UTC m=+83.531412992" Feb 9 09:59:54.494000 audit[4128]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=4128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:54.494000 audit[4128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffece50b80 a2=0 a3=ffffa58f96c0 items=0 ppid=2664 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:54.496000 audit[4128]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:54.496000 audit[4128]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffece50b80 a2=0 a3=ffffa58f96c0 items=0 ppid=2664 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:54.511000 audit[4132]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:54.511000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe9431c40 a2=0 a3=ffffb7d7c6c0 items=0 ppid=2664 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:54.514000 audit[4132]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:54.514000 audit[4132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffe9431c40 a2=0 a3=ffffb7d7c6c0 items=0 ppid=2664 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:54.549478 systemd-networkd[1512]: califae272511d3: Link UP Feb 9 09:59:54.565212 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:59:54.565336 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califae272511d3: link becomes ready Feb 9 09:59:54.565829 systemd-networkd[1512]: califae272511d3: Gained carrier Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.411 [INFO][4109] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0 csi-node-driver- calico-system 481a078e-d96a-457e-bfcb-155d0b9aa028 808 0 2024-02-09 09:58:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 csi-node-driver-xk4kl eth0 default [] [] [kns.calico-system ksa.calico-system.default] califae272511d3 [] []}} ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.411 [INFO][4109] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.479 [INFO][4123] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" HandleID="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.495 [INFO][4123] ipam_plugin.go 268: Auto assigning IP ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" HandleID="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025ebf0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-ee2552a568", "pod":"csi-node-driver-xk4kl", "timestamp":"2024-02-09 09:59:54.479789595 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.495 [INFO][4123] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.496 [INFO][4123] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.496 [INFO][4123] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.498 [INFO][4123] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.507 [INFO][4123] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.513 [INFO][4123] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.515 [INFO][4123] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.519 [INFO][4123] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.520 [INFO][4123] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.523 [INFO][4123] ipam.go 1682: Creating new handle: k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7 Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.527 [INFO][4123] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.533 [INFO][4123] ipam.go 1216: Successfully claimed IPs: [192.168.99.67/26] block=192.168.99.64/26 handle="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.533 [INFO][4123] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.67/26] handle="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.533 [INFO][4123] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:54.582365 env[1396]: 2024-02-09 09:59:54.534 [INFO][4123] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.67/26] IPv6=[] ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" HandleID="k8s-pod-network.9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.536 [INFO][4109] k8s.go 385: Populated endpoint ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"481a078e-d96a-457e-bfcb-155d0b9aa028", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"csi-node-driver-xk4kl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califae272511d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.536 [INFO][4109] k8s.go 386: Calico CNI using IPs: [192.168.99.67/32] ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.536 [INFO][4109] dataplane_linux.go 68: Setting the host side veth name to califae272511d3 ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.566 [INFO][4109] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.566 [INFO][4109] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"481a078e-d96a-457e-bfcb-155d0b9aa028", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7", Pod:"csi-node-driver-xk4kl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califae272511d3", MAC:"f2:12:6c:50:cf:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:54.582962 env[1396]: 2024-02-09 09:59:54.580 [INFO][4109] k8s.go 491: Wrote updated endpoint to datastore ContainerID="9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7" Namespace="calico-system" Pod="csi-node-driver-xk4kl" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 09:59:54.605207 env[1396]: time="2024-02-09T09:59:54.605114279Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:54.605207 env[1396]: time="2024-02-09T09:59:54.605171838Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:54.605407 env[1396]: time="2024-02-09T09:59:54.605183758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:54.605585 env[1396]: time="2024-02-09T09:59:54.605542115Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7 pid=4155 runtime=io.containerd.runc.v2 Feb 9 09:59:54.626350 systemd[1]: Started cri-containerd-9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7.scope. Feb 9 09:59:54.639000 audit[4174]: NETFILTER_CFG table=filter:111 family=2 entries=44 op=nft_register_chain pid=4174 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.639000 audit[4174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22360 a0=3 a1=fffff4061300 a2=0 a3=ffffbab78fa8 items=0 ppid=3669 pid=4174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.639000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.651000 audit: BPF prog-id=161 op=LOAD Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4155 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356235366661626161363030303066366237663338326532656238 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4155 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356235366661626161363030303066366237663338326532656238 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit: BPF prog-id=162 op=LOAD Feb 9 09:59:54.652000 audit[4164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4155 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356235366661626161363030303066366237663338326532656238 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit: BPF prog-id=163 op=LOAD Feb 9 09:59:54.652000 audit[4164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4155 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356235366661626161363030303066366237663338326532656238 Feb 9 09:59:54.652000 audit: BPF prog-id=163 op=UNLOAD Feb 9 09:59:54.652000 audit: BPF prog-id=162 op=UNLOAD Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { perfmon } for pid=4164 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit[4164]: AVC avc: denied { bpf } for pid=4164 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:54.652000 audit: BPF prog-id=164 op=LOAD Feb 9 09:59:54.652000 audit[4164]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4155 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966356235366661626161363030303066366237663338326532656238 Feb 9 09:59:54.667499 env[1396]: time="2024-02-09T09:59:54.667454103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xk4kl,Uid:481a078e-d96a-457e-bfcb-155d0b9aa028,Namespace:calico-system,Attempt:1,} returns sandbox id \"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7\"" Feb 9 09:59:55.334258 systemd-networkd[1512]: cali02a20ef68c7: Gained IPv6LL Feb 9 09:59:55.461264 systemd-networkd[1512]: califd2b50b5ce2: Gained IPv6LL Feb 9 09:59:55.589233 systemd-networkd[1512]: califae272511d3: Gained IPv6LL Feb 9 09:59:56.180369 env[1396]: time="2024-02-09T09:59:56.180328812Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.306 [INFO][4206] k8s.go 578: Cleaning up netns ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.306 [INFO][4206] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" iface="eth0" netns="/var/run/netns/cni-17152e1d-30c1-3c04-0373-d340b5b10105" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.307 [INFO][4206] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" iface="eth0" netns="/var/run/netns/cni-17152e1d-30c1-3c04-0373-d340b5b10105" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.307 [INFO][4206] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" iface="eth0" netns="/var/run/netns/cni-17152e1d-30c1-3c04-0373-d340b5b10105" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.307 [INFO][4206] k8s.go 585: Releasing IP address(es) ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.307 [INFO][4206] utils.go 188: Calico CNI releasing IP address ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.354 [INFO][4212] ipam_plugin.go 415: Releasing address using handleID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.354 [INFO][4212] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.354 [INFO][4212] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.364 [WARNING][4212] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.364 [INFO][4212] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.365 [INFO][4212] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:56.368132 env[1396]: 2024-02-09 09:59:56.367 [INFO][4206] k8s.go 591: Teardown processing complete. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 09:59:56.371546 env[1396]: time="2024-02-09T09:59:56.370635675Z" level=info msg="TearDown network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" successfully" Feb 9 09:59:56.371546 env[1396]: time="2024-02-09T09:59:56.370677275Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" returns successfully" Feb 9 09:59:56.370303 systemd[1]: run-netns-cni\x2d17152e1d\x2d30c1\x2d3c04\x2d0373\x2dd340b5b10105.mount: Deactivated successfully. Feb 9 09:59:56.372145 env[1396]: time="2024-02-09T09:59:56.372110782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-n68jh,Uid:daf03352-b2f0-484b-911f-a0d30945b0e7,Namespace:kube-system,Attempt:1,}" Feb 9 09:59:56.561655 systemd-networkd[1512]: cali80db94c9cbd: Link UP Feb 9 09:59:56.577816 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:59:56.577959 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80db94c9cbd: link becomes ready Feb 9 09:59:56.578453 systemd-networkd[1512]: cali80db94c9cbd: Gained carrier Feb 9 09:59:56.590480 env[1396]: time="2024-02-09T09:59:56.590436967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:56.599361 env[1396]: time="2024-02-09T09:59:56.599318612Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.468 [INFO][4219] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0 coredns-5d78c9869d- kube-system daf03352-b2f0-484b-911f-a0d30945b0e7 825 0 2024-02-09 09:58:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 coredns-5d78c9869d-n68jh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali80db94c9cbd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.468 [INFO][4219] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.509 [INFO][4231] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" HandleID="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.521 [INFO][4231] ipam_plugin.go 268: Auto assigning IP ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" HandleID="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004ff350), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-ee2552a568", "pod":"coredns-5d78c9869d-n68jh", "timestamp":"2024-02-09 09:59:56.509042459 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.522 [INFO][4231] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.522 [INFO][4231] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.522 [INFO][4231] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.524 [INFO][4231] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.528 [INFO][4231] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.532 [INFO][4231] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.536 [INFO][4231] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.538 [INFO][4231] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.538 [INFO][4231] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.540 [INFO][4231] ipam.go 1682: Creating new handle: k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.544 [INFO][4231] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.556 [INFO][4231] ipam.go 1216: Successfully claimed IPs: [192.168.99.68/26] block=192.168.99.64/26 handle="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.556 [INFO][4231] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.68/26] handle="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" host="ci-3510.3.2-a-ee2552a568" Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.556 [INFO][4231] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:56.601222 env[1396]: 2024-02-09 09:59:56.556 [INFO][4231] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.68/26] IPv6=[] ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" HandleID="k8s-pod-network.1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.559 [INFO][4219] k8s.go 385: Populated endpoint ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"daf03352-b2f0-484b-911f-a0d30945b0e7", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"coredns-5d78c9869d-n68jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80db94c9cbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.559 [INFO][4219] k8s.go 386: Calico CNI using IPs: [192.168.99.68/32] ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.559 [INFO][4219] dataplane_linux.go 68: Setting the host side veth name to cali80db94c9cbd ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.579 [INFO][4219] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.579 [INFO][4219] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"daf03352-b2f0-484b-911f-a0d30945b0e7", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a", Pod:"coredns-5d78c9869d-n68jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80db94c9cbd", MAC:"6a:64:d3:d2:bb:b8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:56.601860 env[1396]: 2024-02-09 09:59:56.598 [INFO][4219] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a" Namespace="kube-system" Pod="coredns-5d78c9869d-n68jh" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 09:59:56.607702 env[1396]: time="2024-02-09T09:59:56.607651741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:56.616874 env[1396]: time="2024-02-09T09:59:56.616833103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:56.618055 env[1396]: time="2024-02-09T09:59:56.617620056Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 09:59:56.619125 env[1396]: time="2024-02-09T09:59:56.619056844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 09:59:56.633780 env[1396]: time="2024-02-09T09:59:56.633718639Z" level=info msg="CreateContainer within sandbox \"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 09:59:56.655276 env[1396]: time="2024-02-09T09:59:56.655182617Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:56.655276 env[1396]: time="2024-02-09T09:59:56.655275896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:56.655452 env[1396]: time="2024-02-09T09:59:56.655303416Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:56.655488 env[1396]: time="2024-02-09T09:59:56.655461974Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a pid=4262 runtime=io.containerd.runc.v2 Feb 9 09:59:56.657000 audit[4252]: NETFILTER_CFG table=filter:112 family=2 entries=34 op=nft_register_chain pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:56.657000 audit[4252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17884 a0=3 a1=fffff0f41f50 a2=0 a3=ffff9b276fa8 items=0 ppid=3669 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.657000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:56.670835 systemd[1]: Started cri-containerd-1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a.scope. Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit: BPF prog-id=165 op=LOAD Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4262 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376563353631386465333135343533643236653836366432323664 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4262 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376563353631386465333135343533643236653836366432323664 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit: BPF prog-id=166 op=LOAD Feb 9 09:59:56.695000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4262 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376563353631386465333135343533643236653836366432323664 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit: BPF prog-id=167 op=LOAD Feb 9 09:59:56.695000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4262 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376563353631386465333135343533643236653836366432323664 Feb 9 09:59:56.695000 audit: BPF prog-id=167 op=UNLOAD Feb 9 09:59:56.695000 audit: BPF prog-id=166 op=UNLOAD Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { perfmon } for pid=4271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit[4271]: AVC avc: denied { bpf } for pid=4271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.695000 audit: BPF prog-id=168 op=LOAD Feb 9 09:59:56.695000 audit[4271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4262 pid=4271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164376563353631386465333135343533643236653836366432323664 Feb 9 09:59:56.722566 env[1396]: time="2024-02-09T09:59:56.722496445Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-n68jh,Uid:daf03352-b2f0-484b-911f-a0d30945b0e7,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a\"" Feb 9 09:59:56.726362 env[1396]: time="2024-02-09T09:59:56.726305132Z" level=info msg="CreateContainer within sandbox \"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 09:59:56.745417 env[1396]: time="2024-02-09T09:59:56.745368570Z" level=info msg="CreateContainer within sandbox \"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e\"" Feb 9 09:59:56.746383 env[1396]: time="2024-02-09T09:59:56.746327762Z" level=info msg="StartContainer for \"713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e\"" Feb 9 09:59:56.777590 systemd[1]: Started cri-containerd-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e.scope. Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.795000 audit: BPF prog-id=169 op=LOAD Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4041 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336338633232623966303537356636663664316237386130663231 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4041 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336338633232623966303537356636663664316237386130663231 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.796000 audit: BPF prog-id=170 op=LOAD Feb 9 09:59:56.796000 audit[4302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4041 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336338633232623966303537356636663664316237386130663231 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.797000 audit: BPF prog-id=171 op=LOAD Feb 9 09:59:56.797000 audit[4302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4041 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336338633232623966303537356636663664316237386130663231 Feb 9 09:59:56.798000 audit: BPF prog-id=171 op=UNLOAD Feb 9 09:59:56.798000 audit: BPF prog-id=170 op=UNLOAD Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { perfmon } for pid=4302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit[4302]: AVC avc: denied { bpf } for pid=4302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.798000 audit: BPF prog-id=172 op=LOAD Feb 9 09:59:56.798000 audit[4302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4041 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731336338633232623966303537356636663664316237386130663231 Feb 9 09:59:56.804418 env[1396]: time="2024-02-09T09:59:56.804367469Z" level=info msg="CreateContainer within sandbox \"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"513b8ce244a80575541445ce56ea869d8fea6e76c3421ce2b1a51dddca7df18e\"" Feb 9 09:59:56.807493 env[1396]: time="2024-02-09T09:59:56.807450683Z" level=info msg="StartContainer for \"513b8ce244a80575541445ce56ea869d8fea6e76c3421ce2b1a51dddca7df18e\"" Feb 9 09:59:56.836219 systemd[1]: Started cri-containerd-513b8ce244a80575541445ce56ea869d8fea6e76c3421ce2b1a51dddca7df18e.scope. Feb 9 09:59:56.856405 env[1396]: time="2024-02-09T09:59:56.856337067Z" level=info msg="StartContainer for \"713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e\" returns successfully" Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.859000 audit: BPF prog-id=173 op=LOAD Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4262 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336238636532343461383035373535343134343563653536656138 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4262 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336238636532343461383035373535343134343563653536656138 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit: BPF prog-id=174 op=LOAD Feb 9 09:59:56.861000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4262 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336238636532343461383035373535343134343563653536656138 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit: BPF prog-id=175 op=LOAD Feb 9 09:59:56.861000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4262 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336238636532343461383035373535343134343563653536656138 Feb 9 09:59:56.861000 audit: BPF prog-id=175 op=UNLOAD Feb 9 09:59:56.861000 audit: BPF prog-id=174 op=UNLOAD Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.861000 audit: BPF prog-id=176 op=LOAD Feb 9 09:59:56.861000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4262 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531336238636532343461383035373535343134343563653536656138 Feb 9 09:59:56.881996 env[1396]: time="2024-02-09T09:59:56.881928850Z" level=info msg="StartContainer for \"513b8ce244a80575541445ce56ea869d8fea6e76c3421ce2b1a51dddca7df18e\" returns successfully" Feb 9 09:59:57.447149 kubelet[2492]: I0209 09:59:57.447069 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-n68jh" podStartSLOduration=72.447032667 podCreationTimestamp="2024-02-09 09:58:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 09:59:57.44673675 +0000 UTC m=+86.517366624" watchObservedRunningTime="2024-02-09 09:59:57.447032667 +0000 UTC m=+86.517662541" Feb 9 09:59:57.459186 systemd[1]: run-containerd-runc-k8s.io-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e-runc.WBnkdb.mount: Deactivated successfully. Feb 9 09:59:57.500267 kubelet[2492]: I0209 09:59:57.500206 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7c5b8c587-msd4t" podStartSLOduration=63.083606991 podCreationTimestamp="2024-02-09 09:58:52 +0000 UTC" firstStartedPulling="2024-02-09 09:59:54.202024101 +0000 UTC m=+83.272653975" lastFinishedPulling="2024-02-09 09:59:56.618583448 +0000 UTC m=+85.689213322" observedRunningTime="2024-02-09 09:59:57.477989565 +0000 UTC m=+86.548619439" watchObservedRunningTime="2024-02-09 09:59:57.500166338 +0000 UTC m=+86.570796212" Feb 9 09:59:57.539000 audit[4389]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:57.539000 audit[4389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd2334630 a2=0 a3=ffff8c5406c0 items=0 ppid=2664 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:57.539000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:57.597000 audit[4389]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:57.597000 audit[4389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffd2334630 a2=0 a3=ffff8c5406c0 items=0 ppid=2664 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:57.597000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:57.639000 audit[4391]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:57.639000 audit[4391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffffe84eda0 a2=0 a3=ffff8876b6c0 items=0 ppid=2664 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:57.639000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:57.665000 audit[4391]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:57.665000 audit[4391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=fffffe84eda0 a2=0 a3=ffff8876b6c0 items=0 ppid=2664 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:57.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:58.021246 systemd-networkd[1512]: cali80db94c9cbd: Gained IPv6LL Feb 9 09:59:58.497443 env[1396]: time="2024-02-09T09:59:58.497388568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:58.507520 env[1396]: time="2024-02-09T09:59:58.507460403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:58.513049 env[1396]: time="2024-02-09T09:59:58.512998356Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:58.517804 env[1396]: time="2024-02-09T09:59:58.517745077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:58.518410 env[1396]: time="2024-02-09T09:59:58.518365911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 09:59:58.520844 env[1396]: time="2024-02-09T09:59:58.520767011Z" level=info msg="CreateContainer within sandbox \"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 09:59:58.683100 env[1396]: time="2024-02-09T09:59:58.682677809Z" level=info msg="CreateContainer within sandbox \"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4759f674d4b8180765d829ffefa6bb0761275944a854211a8cb12941a8736876\"" Feb 9 09:59:58.683606 env[1396]: time="2024-02-09T09:59:58.683560562Z" level=info msg="StartContainer for \"4759f674d4b8180765d829ffefa6bb0761275944a854211a8cb12941a8736876\"" Feb 9 09:59:58.718440 systemd[1]: run-containerd-runc-k8s.io-4759f674d4b8180765d829ffefa6bb0761275944a854211a8cb12941a8736876-runc.Ib2bEU.mount: Deactivated successfully. Feb 9 09:59:58.723202 systemd[1]: Started cri-containerd-4759f674d4b8180765d829ffefa6bb0761275944a854211a8cb12941a8736876.scope. Feb 9 09:59:58.758336 kernel: kauditd_printk_skb: 425 callbacks suppressed Feb 9 09:59:58.758500 kernel: audit: type=1400 audit(1707472798.746:1128): avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cf5a0 a2=3c a3=0 items=0 ppid=4155 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.808335 kernel: audit: type=1300 audit(1707472798.746:1128): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001cf5a0 a2=3c a3=0 items=0 ppid=4155 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353966363734643462383138303736356438323966666566613662 Feb 9 09:59:58.838262 kernel: audit: type=1327 audit(1707472798.746:1128): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353966363734643462383138303736356438323966666566613662 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.860266 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.880850 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.927679 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.927817 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.950170 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.971457 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.992791 kernel: audit: type=1400 audit(1707472798.746:1129): avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.993225 env[1396]: time="2024-02-09T09:59:58.993168917Z" level=info msg="StartContainer for \"4759f674d4b8180765d829ffefa6bb0761275944a854211a8cb12941a8736876\" returns successfully" Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit: BPF prog-id=177 op=LOAD Feb 9 09:59:58.746000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001cf8e0 a2=78 a3=0 items=0 ppid=4155 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353966363734643462383138303736356438323966666566613662 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit: BPF prog-id=178 op=LOAD Feb 9 09:59:58.746000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001cf670 a2=78 a3=0 items=0 ppid=4155 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353966363734643462383138303736356438323966666566613662 Feb 9 09:59:58.746000 audit: BPF prog-id=178 op=UNLOAD Feb 9 09:59:58.746000 audit: BPF prog-id=177 op=UNLOAD Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:58.746000 audit: BPF prog-id=179 op=LOAD Feb 9 09:59:58.746000 audit[4401]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001cfb40 a2=78 a3=0 items=0 ppid=4155 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:58.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353966363734643462383138303736356438323966666566613662 Feb 9 09:59:58.997733 env[1396]: time="2024-02-09T09:59:58.997694119Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:00:01.280732 env[1396]: time="2024-02-09T10:00:01.280682427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:01.289038 env[1396]: time="2024-02-09T10:00:01.288960798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:01.299464 env[1396]: time="2024-02-09T10:00:01.299408391Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:01.303877 env[1396]: time="2024-02-09T10:00:01.303830715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:01.304504 env[1396]: time="2024-02-09T10:00:01.304469149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:00:01.309134 env[1396]: time="2024-02-09T10:00:01.308096399Z" level=info msg="CreateContainer within sandbox \"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:00:01.336181 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2469212293.mount: Deactivated successfully. Feb 9 10:00:01.353465 env[1396]: time="2024-02-09T10:00:01.353411263Z" level=info msg="CreateContainer within sandbox \"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f3a25e62f7e9e462d7b2bf1ceb3b1e797b0109a3f49dc989af24150eeac0ca95\"" Feb 9 10:00:01.354387 env[1396]: time="2024-02-09T10:00:01.354350096Z" level=info msg="StartContainer for \"f3a25e62f7e9e462d7b2bf1ceb3b1e797b0109a3f49dc989af24150eeac0ca95\"" Feb 9 10:00:01.375992 systemd[1]: Started cri-containerd-f3a25e62f7e9e462d7b2bf1ceb3b1e797b0109a3f49dc989af24150eeac0ca95.scope. Feb 9 10:00:01.381283 systemd[1]: run-containerd-runc-k8s.io-f3a25e62f7e9e462d7b2bf1ceb3b1e797b0109a3f49dc989af24150eeac0ca95-runc.pzOB6o.mount: Deactivated successfully. Feb 9 10:00:01.402000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.402000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4155 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613235653632663765396534363264376232626631636562336231 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.403000 audit: BPF prog-id=180 op=LOAD Feb 9 10:00:01.403000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4155 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613235653632663765396534363264376232626631636562336231 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.404000 audit: BPF prog-id=181 op=LOAD Feb 9 10:00:01.404000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4155 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613235653632663765396534363264376232626631636562336231 Feb 9 10:00:01.404000 audit: BPF prog-id=181 op=UNLOAD Feb 9 10:00:01.405000 audit: BPF prog-id=180 op=UNLOAD Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { perfmon } for pid=4441 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit[4441]: AVC avc: denied { bpf } for pid=4441 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.405000 audit: BPF prog-id=182 op=LOAD Feb 9 10:00:01.405000 audit[4441]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4155 pid=4441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613235653632663765396534363264376232626631636562336231 Feb 9 10:00:01.455818 env[1396]: time="2024-02-09T10:00:01.455775814Z" level=info msg="StartContainer for \"f3a25e62f7e9e462d7b2bf1ceb3b1e797b0109a3f49dc989af24150eeac0ca95\" returns successfully" Feb 9 10:00:02.312549 kubelet[2492]: I0209 10:00:02.312516 2492 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:00:02.313016 kubelet[2492]: I0209 10:00:02.313000 2492 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:00:08.730628 systemd[1]: run-containerd-runc-k8s.io-854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466-runc.cxyQVQ.mount: Deactivated successfully. Feb 9 10:00:08.801697 kubelet[2492]: I0209 10:00:08.801644 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xk4kl" podStartSLOduration=70.165499879 podCreationTimestamp="2024-02-09 09:58:52 +0000 UTC" firstStartedPulling="2024-02-09 09:59:54.669154409 +0000 UTC m=+83.739784283" lastFinishedPulling="2024-02-09 10:00:01.305253423 +0000 UTC m=+90.375883257" observedRunningTime="2024-02-09 10:00:02.47601413 +0000 UTC m=+91.546644004" watchObservedRunningTime="2024-02-09 10:00:08.801598853 +0000 UTC m=+97.872228727" Feb 9 10:00:11.200797 kubelet[2492]: I0209 10:00:11.200740 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:00:11.207236 systemd[1]: Created slice kubepods-besteffort-pod222e775a_6d7d_4dda_a388_692ffa703caa.slice. Feb 9 10:00:11.217249 kubelet[2492]: W0209 10:00:11.217217 2492 reflector.go:533] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 10:00:11.217464 kubelet[2492]: E0209 10:00:11.217446 2492 reflector.go:148] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 10:00:11.217776 kubelet[2492]: W0209 10:00:11.217755 2492 reflector.go:533] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 10:00:11.217889 kubelet[2492]: E0209 10:00:11.217876 2492 reflector.go:148] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.2-a-ee2552a568" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.2-a-ee2552a568' and this object Feb 9 10:00:11.227839 kubelet[2492]: I0209 10:00:11.227791 2492 topology_manager.go:212] "Topology Admit Handler" Feb 9 10:00:11.233582 systemd[1]: Created slice kubepods-besteffort-pod52b7fc9c_3f3d_4395_b88c_157e5781c751.slice. Feb 9 10:00:11.277000 audit[4508]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.284903 kernel: kauditd_printk_skb: 76 callbacks suppressed Feb 9 10:00:11.285096 kernel: audit: type=1325 audit(1707472811.277:1140): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.277000 audit[4508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd16ddd50 a2=0 a3=ffff9b3c16c0 items=0 ppid=2664 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.335234 kernel: audit: type=1300 audit(1707472811.277:1140): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd16ddd50 a2=0 a3=ffff9b3c16c0 items=0 ppid=2664 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.335557 kubelet[2492]: I0209 10:00:11.335525 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-569ks\" (UniqueName: \"kubernetes.io/projected/52b7fc9c-3f3d-4395-b88c-157e5781c751-kube-api-access-569ks\") pod \"calico-apiserver-6bf8847459-h4b5k\" (UID: \"52b7fc9c-3f3d-4395-b88c-157e5781c751\") " pod="calico-apiserver/calico-apiserver-6bf8847459-h4b5k" Feb 9 10:00:11.335653 kubelet[2492]: I0209 10:00:11.335578 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nrckc\" (UniqueName: \"kubernetes.io/projected/222e775a-6d7d-4dda-a388-692ffa703caa-kube-api-access-nrckc\") pod \"calico-apiserver-6bf8847459-cksk7\" (UID: \"222e775a-6d7d-4dda-a388-692ffa703caa\") " pod="calico-apiserver/calico-apiserver-6bf8847459-cksk7" Feb 9 10:00:11.335653 kubelet[2492]: I0209 10:00:11.335605 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/52b7fc9c-3f3d-4395-b88c-157e5781c751-calico-apiserver-certs\") pod \"calico-apiserver-6bf8847459-h4b5k\" (UID: \"52b7fc9c-3f3d-4395-b88c-157e5781c751\") " pod="calico-apiserver/calico-apiserver-6bf8847459-h4b5k" Feb 9 10:00:11.335653 kubelet[2492]: I0209 10:00:11.335629 2492 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/222e775a-6d7d-4dda-a388-692ffa703caa-calico-apiserver-certs\") pod \"calico-apiserver-6bf8847459-cksk7\" (UID: \"222e775a-6d7d-4dda-a388-692ffa703caa\") " pod="calico-apiserver/calico-apiserver-6bf8847459-cksk7" Feb 9 10:00:11.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.355922 kernel: audit: type=1327 audit(1707472811.277:1140): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.280000 audit[4508]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.373098 kernel: audit: type=1325 audit(1707472811.280:1141): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.280000 audit[4508]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd16ddd50 a2=0 a3=ffff9b3c16c0 items=0 ppid=2664 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.407012 kernel: audit: type=1300 audit(1707472811.280:1141): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd16ddd50 a2=0 a3=ffff9b3c16c0 items=0 ppid=2664 pid=4508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.424932 kernel: audit: type=1327 audit(1707472811.280:1141): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.336000 audit[4510]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.443023 kernel: audit: type=1325 audit(1707472811.336:1142): table=filter:119 family=2 entries=10 op=nft_register_rule pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.336000 audit[4510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffefe81d90 a2=0 a3=ffffa87026c0 items=0 ppid=2664 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.476393 kernel: audit: type=1300 audit(1707472811.336:1142): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffefe81d90 a2=0 a3=ffffa87026c0 items=0 ppid=2664 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.495303 kernel: audit: type=1327 audit(1707472811.336:1142): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:11.359000 audit[4510]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.519182 kernel: audit: type=1325 audit(1707472811.359:1143): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:11.359000 audit[4510]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffefe81d90 a2=0 a3=ffffa87026c0 items=0 ppid=2664 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:11.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:12.111801 env[1396]: time="2024-02-09T10:00:12.111429184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bf8847459-cksk7,Uid:222e775a-6d7d-4dda-a388-692ffa703caa,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:00:12.138831 env[1396]: time="2024-02-09T10:00:12.138778327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bf8847459-h4b5k,Uid:52b7fc9c-3f3d-4395-b88c-157e5781c751,Namespace:calico-apiserver,Attempt:0,}" Feb 9 10:00:12.338585 systemd-networkd[1512]: cali66260ee34d1: Link UP Feb 9 10:00:12.358057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:00:12.358585 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali66260ee34d1: link becomes ready Feb 9 10:00:12.359845 systemd-networkd[1512]: cali66260ee34d1: Gained carrier Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.202 [INFO][4515] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0 calico-apiserver-6bf8847459- calico-apiserver 222e775a-6d7d-4dda-a388-692ffa703caa 936 0 2024-02-09 10:00:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bf8847459 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 calico-apiserver-6bf8847459-cksk7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali66260ee34d1 [] []}} ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.202 [INFO][4515] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.258 [INFO][4537] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" HandleID="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.281 [INFO][4537] ipam_plugin.go 268: Auto assigning IP ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" HandleID="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400023afc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-ee2552a568", "pod":"calico-apiserver-6bf8847459-cksk7", "timestamp":"2024-02-09 10:00:12.258190884 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.281 [INFO][4537] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.281 [INFO][4537] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.281 [INFO][4537] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.283 [INFO][4537] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.288 [INFO][4537] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.294 [INFO][4537] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.296 [INFO][4537] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.305 [INFO][4537] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.305 [INFO][4537] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.308 [INFO][4537] ipam.go 1682: Creating new handle: k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363 Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.315 [INFO][4537] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.324 [INFO][4537] ipam.go 1216: Successfully claimed IPs: [192.168.99.69/26] block=192.168.99.64/26 handle="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.324 [INFO][4537] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.69/26] handle="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.324 [INFO][4537] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:12.379352 env[1396]: 2024-02-09 10:00:12.324 [INFO][4537] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.69/26] IPv6=[] ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" HandleID="k8s-pod-network.4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.326 [INFO][4515] k8s.go 385: Populated endpoint ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0", GenerateName:"calico-apiserver-6bf8847459-", Namespace:"calico-apiserver", SelfLink:"", UID:"222e775a-6d7d-4dda-a388-692ffa703caa", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bf8847459", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"calico-apiserver-6bf8847459-cksk7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali66260ee34d1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.326 [INFO][4515] k8s.go 386: Calico CNI using IPs: [192.168.99.69/32] ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.326 [INFO][4515] dataplane_linux.go 68: Setting the host side veth name to cali66260ee34d1 ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.359 [INFO][4515] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.360 [INFO][4515] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0", GenerateName:"calico-apiserver-6bf8847459-", Namespace:"calico-apiserver", SelfLink:"", UID:"222e775a-6d7d-4dda-a388-692ffa703caa", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bf8847459", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363", Pod:"calico-apiserver-6bf8847459-cksk7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali66260ee34d1", MAC:"8a:2f:02:89:f8:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:12.379983 env[1396]: 2024-02-09 10:00:12.375 [INFO][4515] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-cksk7" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--cksk7-eth0" Feb 9 10:00:12.421365 systemd-networkd[1512]: cali82fb20c1db2: Link UP Feb 9 10:00:12.433791 systemd-networkd[1512]: cali82fb20c1db2: Gained carrier Feb 9 10:00:12.434336 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82fb20c1db2: link becomes ready Feb 9 10:00:12.446903 env[1396]: time="2024-02-09T10:00:12.442806775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:00:12.446903 env[1396]: time="2024-02-09T10:00:12.442854417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:00:12.446903 env[1396]: time="2024-02-09T10:00:12.442865337Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:00:12.446903 env[1396]: time="2024-02-09T10:00:12.443022783Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363 pid=4577 runtime=io.containerd.runc.v2 Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.252 [INFO][4525] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0 calico-apiserver-6bf8847459- calico-apiserver 52b7fc9c-3f3d-4395-b88c-157e5781c751 937 0 2024-02-09 10:00:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bf8847459 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-ee2552a568 calico-apiserver-6bf8847459-h4b5k eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali82fb20c1db2 [] []}} ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.254 [INFO][4525] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.296 [INFO][4544] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" HandleID="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.313 [INFO][4544] ipam_plugin.go 268: Auto assigning IP ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" HandleID="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-ee2552a568", "pod":"calico-apiserver-6bf8847459-h4b5k", "timestamp":"2024-02-09 10:00:12.296536014 +0000 UTC"}, Hostname:"ci-3510.3.2-a-ee2552a568", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.313 [INFO][4544] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.324 [INFO][4544] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.324 [INFO][4544] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-ee2552a568' Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.334 [INFO][4544] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.360 [INFO][4544] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.370 [INFO][4544] ipam.go 489: Trying affinity for 192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.385 [INFO][4544] ipam.go 155: Attempting to load block cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.393 [INFO][4544] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.99.64/26 host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.393 [INFO][4544] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.99.64/26 handle="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.397 [INFO][4544] ipam.go 1682: Creating new handle: k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14 Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.403 [INFO][4544] ipam.go 1203: Writing block in order to claim IPs block=192.168.99.64/26 handle="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.412 [INFO][4544] ipam.go 1216: Successfully claimed IPs: [192.168.99.70/26] block=192.168.99.64/26 handle="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.412 [INFO][4544] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.99.70/26] handle="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" host="ci-3510.3.2-a-ee2552a568" Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.412 [INFO][4544] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:12.450415 env[1396]: 2024-02-09 10:00:12.412 [INFO][4544] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.99.70/26] IPv6=[] ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" HandleID="k8s-pod-network.43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.413 [INFO][4525] k8s.go 385: Populated endpoint ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0", GenerateName:"calico-apiserver-6bf8847459-", Namespace:"calico-apiserver", SelfLink:"", UID:"52b7fc9c-3f3d-4395-b88c-157e5781c751", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bf8847459", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"", Pod:"calico-apiserver-6bf8847459-h4b5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82fb20c1db2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.414 [INFO][4525] k8s.go 386: Calico CNI using IPs: [192.168.99.70/32] ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.414 [INFO][4525] dataplane_linux.go 68: Setting the host side veth name to cali82fb20c1db2 ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.433 [INFO][4525] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.434 [INFO][4525] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0", GenerateName:"calico-apiserver-6bf8847459-", Namespace:"calico-apiserver", SelfLink:"", UID:"52b7fc9c-3f3d-4395-b88c-157e5781c751", ResourceVersion:"937", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bf8847459", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14", Pod:"calico-apiserver-6bf8847459-h4b5k", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.99.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali82fb20c1db2", MAC:"2e:3f:29:2b:2d:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:12.451234 env[1396]: 2024-02-09 10:00:12.446 [INFO][4525] k8s.go 491: Wrote updated endpoint to datastore ContainerID="43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14" Namespace="calico-apiserver" Pod="calico-apiserver-6bf8847459-h4b5k" WorkloadEndpoint="ci--3510.3.2--a--ee2552a568-k8s-calico--apiserver--6bf8847459--h4b5k-eth0" Feb 9 10:00:12.470377 systemd[1]: Started cri-containerd-4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363.scope. Feb 9 10:00:12.482598 env[1396]: time="2024-02-09T10:00:12.482454315Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:00:12.482598 env[1396]: time="2024-02-09T10:00:12.482498837Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:00:12.482598 env[1396]: time="2024-02-09T10:00:12.482509837Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:00:12.485303 env[1396]: time="2024-02-09T10:00:12.485209862Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14 pid=4617 runtime=io.containerd.runc.v2 Feb 9 10:00:12.489000 audit[4604]: NETFILTER_CFG table=filter:121 family=2 entries=55 op=nft_register_chain pid=4604 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:00:12.489000 audit[4604]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffeea30300 a2=0 a3=ffff8d064fa8 items=0 ppid=3669 pid=4604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:00:12.508261 systemd[1]: Started cri-containerd-43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14.scope. Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.523000 audit: BPF prog-id=183 op=LOAD Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4577 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383933353262323431666138663033393462333462623061316563 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4577 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383933353262323431666138663033393462333462623061316563 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit: BPF prog-id=184 op=LOAD Feb 9 10:00:12.524000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4577 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383933353262323431666138663033393462333462623061316563 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit: BPF prog-id=185 op=LOAD Feb 9 10:00:12.524000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4577 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383933353262323431666138663033393462333462623061316563 Feb 9 10:00:12.524000 audit: BPF prog-id=185 op=UNLOAD Feb 9 10:00:12.524000 audit: BPF prog-id=184 op=UNLOAD Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { perfmon } for pid=4585 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit[4585]: AVC avc: denied { bpf } for pid=4585 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.524000 audit: BPF prog-id=186 op=LOAD Feb 9 10:00:12.524000 audit[4585]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4577 pid=4585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432383933353262323431666138663033393462333462623061316563 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.530000 audit: BPF prog-id=187 op=LOAD Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4617 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303238653238323531386138353265363237313732346336306130 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4617 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303238653238323531386138353265363237313732346336306130 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit: BPF prog-id=188 op=LOAD Feb 9 10:00:12.531000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4617 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303238653238323531386138353265363237313732346336306130 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit: BPF prog-id=189 op=LOAD Feb 9 10:00:12.531000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4617 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303238653238323531386138353265363237313732346336306130 Feb 9 10:00:12.531000 audit: BPF prog-id=189 op=UNLOAD Feb 9 10:00:12.531000 audit: BPF prog-id=188 op=UNLOAD Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:12.531000 audit: BPF prog-id=190 op=LOAD Feb 9 10:00:12.531000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4617 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433303238653238323531386138353265363237313732346336306130 Feb 9 10:00:12.545000 audit[4652]: NETFILTER_CFG table=filter:122 family=2 entries=52 op=nft_register_chain pid=4652 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:00:12.545000 audit[4652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26144 a0=3 a1=ffffd523d0b0 a2=0 a3=ffff8178bfa8 items=0 ppid=3669 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:12.545000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:00:12.576491 env[1396]: time="2024-02-09T10:00:12.576447125Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bf8847459-cksk7,Uid:222e775a-6d7d-4dda-a388-692ffa703caa,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363\"" Feb 9 10:00:12.580335 env[1396]: time="2024-02-09T10:00:12.579367919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:00:12.583285 env[1396]: time="2024-02-09T10:00:12.583202508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bf8847459-h4b5k,Uid:52b7fc9c-3f3d-4395-b88c-157e5781c751,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14\"" Feb 9 10:00:13.509216 systemd-networkd[1512]: cali66260ee34d1: Gained IPv6LL Feb 9 10:00:13.765247 systemd-networkd[1512]: cali82fb20c1db2: Gained IPv6LL Feb 9 10:00:25.265000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.272912 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 10:00:25.273061 kernel: audit: type=1400 audit(1707472825.265:1182): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.265000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40094c2e00 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.335147 kernel: audit: type=1300 audit(1707472825.265:1182): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40094c2e00 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.265000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.365029 kernel: audit: type=1327 audit(1707472825.265:1182): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.276000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.393829 kernel: audit: type=1400 audit(1707472825.276:1183): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.276000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4000c1e0f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.429277 kernel: audit: type=1300 audit(1707472825.276:1183): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4000c1e0f0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.459466 kernel: audit: type=1327 audit(1707472825.276:1183): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.276000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.488061 kernel: audit: type=1400 audit(1707472825.276:1184): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.276000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4000c1eab0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.524829 kernel: audit: type=1300 audit(1707472825.276:1184): arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4000c1eab0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.555385 kernel: audit: type=1327 audit(1707472825.276:1184): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.585471 kernel: audit: type=1400 audit(1707472825.524:1185): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4008235920 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4008235980 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:25.524000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:25.524000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=40094c3060 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:00:25.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:00:26.543000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:26.543000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001eeede0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:26.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:26.544000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:26.544000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012d3260 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:26.544000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:26.858490 systemd[1]: run-containerd-runc-k8s.io-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e-runc.QxcnsR.mount: Deactivated successfully. Feb 9 10:00:28.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.33:22-10.200.12.6:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:28.577141 systemd[1]: Started sshd@7-10.200.20.33:22-10.200.12.6:37106.service. Feb 9 10:00:29.045000 audit[4703]: USER_ACCT pid=4703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.046612 sshd[4703]: Accepted publickey for core from 10.200.12.6 port 37106 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:29.047000 audit[4703]: CRED_ACQ pid=4703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.047000 audit[4703]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb99d870 a2=3 a3=1 items=0 ppid=1 pid=4703 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:29.048733 sshd[4703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:29.053413 systemd-logind[1374]: New session 10 of user core. Feb 9 10:00:29.053962 systemd[1]: Started session-10.scope. Feb 9 10:00:29.058000 audit[4703]: USER_START pid=4703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.060000 audit[4705]: CRED_ACQ pid=4705 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.494527 sshd[4703]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:29.494000 audit[4703]: USER_END pid=4703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.494000 audit[4703]: CRED_DISP pid=4703 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:29.497773 systemd-logind[1374]: Session 10 logged out. Waiting for processes to exit. Feb 9 10:00:29.497965 systemd[1]: sshd@7-10.200.20.33:22-10.200.12.6:37106.service: Deactivated successfully. Feb 9 10:00:29.498787 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 10:00:29.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.33:22-10.200.12.6:37106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:29.499808 systemd-logind[1374]: Removed session 10. Feb 9 10:00:31.077201 env[1396]: time="2024-02-09T10:00:31.077148706Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.142 [WARNING][4736] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e8459746-414b-4022-8167-b28d75ed22ca", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71", Pod:"coredns-5d78c9869d-8qcp2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02a20ef68c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.143 [INFO][4736] k8s.go 578: Cleaning up netns ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.143 [INFO][4736] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" iface="eth0" netns="" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.143 [INFO][4736] k8s.go 585: Releasing IP address(es) ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.143 [INFO][4736] utils.go 188: Calico CNI releasing IP address ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.171 [INFO][4742] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.171 [INFO][4742] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.171 [INFO][4742] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.185 [WARNING][4742] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.186 [INFO][4742] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.187 [INFO][4742] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:31.190293 env[1396]: 2024-02-09 10:00:31.189 [INFO][4736] k8s.go 591: Teardown processing complete. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.190837 env[1396]: time="2024-02-09T10:00:31.190801450Z" level=info msg="TearDown network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" successfully" Feb 9 10:00:31.190906 env[1396]: time="2024-02-09T10:00:31.190889053Z" level=info msg="StopPodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" returns successfully" Feb 9 10:00:31.191643 env[1396]: time="2024-02-09T10:00:31.191571312Z" level=info msg="RemovePodSandbox for \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 10:00:31.191746 env[1396]: time="2024-02-09T10:00:31.191632634Z" level=info msg="Forcibly stopping sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\"" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.268 [WARNING][4765] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e8459746-414b-4022-8167-b28d75ed22ca", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"3a47d314aa5f50463984a650bfe32013288e67ca7d1b666671a7f30bd8826e71", Pod:"coredns-5d78c9869d-8qcp2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali02a20ef68c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.268 [INFO][4765] k8s.go 578: Cleaning up netns ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.268 [INFO][4765] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" iface="eth0" netns="" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.269 [INFO][4765] k8s.go 585: Releasing IP address(es) ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.269 [INFO][4765] utils.go 188: Calico CNI releasing IP address ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.304 [INFO][4771] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.304 [INFO][4771] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.304 [INFO][4771] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.315 [WARNING][4771] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.315 [INFO][4771] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" HandleID="k8s-pod-network.6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--8qcp2-eth0" Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.316 [INFO][4771] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:31.319412 env[1396]: 2024-02-09 10:00:31.318 [INFO][4765] k8s.go 591: Teardown processing complete. ContainerID="6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70" Feb 9 10:00:31.319871 env[1396]: time="2024-02-09T10:00:31.319442820Z" level=info msg="TearDown network for sandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" successfully" Feb 9 10:00:31.332037 env[1396]: time="2024-02-09T10:00:31.331274556Z" level=info msg="RemovePodSandbox \"6e81a7cc342ea400c00fd3b54f80014a5e615a41334f6d743e1ea0664a3fde70\" returns successfully" Feb 9 10:00:31.332376 env[1396]: time="2024-02-09T10:00:31.332336226Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.393 [WARNING][4791] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"daf03352-b2f0-484b-911f-a0d30945b0e7", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a", Pod:"coredns-5d78c9869d-n68jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80db94c9cbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.393 [INFO][4791] k8s.go 578: Cleaning up netns ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.393 [INFO][4791] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" iface="eth0" netns="" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.393 [INFO][4791] k8s.go 585: Releasing IP address(es) ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.393 [INFO][4791] utils.go 188: Calico CNI releasing IP address ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.429 [INFO][4797] ipam_plugin.go 415: Releasing address using handleID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.429 [INFO][4797] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.429 [INFO][4797] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.446 [WARNING][4797] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.447 [INFO][4797] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.451 [INFO][4797] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:31.453917 env[1396]: 2024-02-09 10:00:31.452 [INFO][4791] k8s.go 591: Teardown processing complete. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.454516 env[1396]: time="2024-02-09T10:00:31.454478652Z" level=info msg="TearDown network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" successfully" Feb 9 10:00:31.454589 env[1396]: time="2024-02-09T10:00:31.454572134Z" level=info msg="StopPodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" returns successfully" Feb 9 10:00:31.455208 env[1396]: time="2024-02-09T10:00:31.455164311Z" level=info msg="RemovePodSandbox for \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 10:00:31.455291 env[1396]: time="2024-02-09T10:00:31.455205672Z" level=info msg="Forcibly stopping sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\"" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.522 [WARNING][4818] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"daf03352-b2f0-484b-911f-a0d30945b0e7", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"1d7ec5618de315453d26e866d226d1667388c2de5e7c19333e31da5aba44f79a", Pod:"coredns-5d78c9869d-n68jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.99.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali80db94c9cbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.522 [INFO][4818] k8s.go 578: Cleaning up netns ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.522 [INFO][4818] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" iface="eth0" netns="" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.522 [INFO][4818] k8s.go 585: Releasing IP address(es) ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.522 [INFO][4818] utils.go 188: Calico CNI releasing IP address ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.561 [INFO][4824] ipam_plugin.go 415: Releasing address using handleID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.561 [INFO][4824] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.561 [INFO][4824] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.571 [WARNING][4824] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.571 [INFO][4824] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" HandleID="k8s-pod-network.a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Workload="ci--3510.3.2--a--ee2552a568-k8s-coredns--5d78c9869d--n68jh-eth0" Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.581 [INFO][4824] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:31.585423 env[1396]: 2024-02-09 10:00:31.583 [INFO][4818] k8s.go 591: Teardown processing complete. ContainerID="a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f" Feb 9 10:00:31.585423 env[1396]: time="2024-02-09T10:00:31.584952593Z" level=info msg="TearDown network for sandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" successfully" Feb 9 10:00:31.855785 env[1396]: time="2024-02-09T10:00:31.855065697Z" level=info msg="RemovePodSandbox \"a74642f1259d53e9941a4f82cad8fcaf399ad05a8015a3ffea7241bf0f7c4e6f\" returns successfully" Feb 9 10:00:31.856277 env[1396]: time="2024-02-09T10:00:31.856244851Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.924 [WARNING][4843] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"481a078e-d96a-457e-bfcb-155d0b9aa028", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7", Pod:"csi-node-driver-xk4kl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califae272511d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.924 [INFO][4843] k8s.go 578: Cleaning up netns ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.924 [INFO][4843] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" iface="eth0" netns="" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.924 [INFO][4843] k8s.go 585: Releasing IP address(es) ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.924 [INFO][4843] utils.go 188: Calico CNI releasing IP address ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.945 [INFO][4849] ipam_plugin.go 415: Releasing address using handleID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.945 [INFO][4849] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.945 [INFO][4849] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.961 [WARNING][4849] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.961 [INFO][4849] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.963 [INFO][4849] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:31.965720 env[1396]: 2024-02-09 10:00:31.964 [INFO][4843] k8s.go 591: Teardown processing complete. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:31.969690 env[1396]: time="2024-02-09T10:00:31.965759758Z" level=info msg="TearDown network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" successfully" Feb 9 10:00:31.969690 env[1396]: time="2024-02-09T10:00:31.965799159Z" level=info msg="StopPodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" returns successfully" Feb 9 10:00:31.969690 env[1396]: time="2024-02-09T10:00:31.966456418Z" level=info msg="RemovePodSandbox for \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 10:00:31.969690 env[1396]: time="2024-02-09T10:00:31.966491419Z" level=info msg="Forcibly stopping sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\"" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.017 [WARNING][4869] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"481a078e-d96a-457e-bfcb-155d0b9aa028", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"9f5b56fabaa60000f6b7f382e2eb8456220a9559453ac2314ce639d03d8d42b7", Pod:"csi-node-driver-xk4kl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.99.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califae272511d3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.018 [INFO][4869] k8s.go 578: Cleaning up netns ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.018 [INFO][4869] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" iface="eth0" netns="" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.018 [INFO][4869] k8s.go 585: Releasing IP address(es) ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.018 [INFO][4869] utils.go 188: Calico CNI releasing IP address ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.037 [INFO][4875] ipam_plugin.go 415: Releasing address using handleID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.037 [INFO][4875] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.037 [INFO][4875] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.052 [WARNING][4875] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.052 [INFO][4875] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" HandleID="k8s-pod-network.f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Workload="ci--3510.3.2--a--ee2552a568-k8s-csi--node--driver--xk4kl-eth0" Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.054 [INFO][4875] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:32.056882 env[1396]: 2024-02-09 10:00:32.055 [INFO][4869] k8s.go 591: Teardown processing complete. ContainerID="f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d" Feb 9 10:00:32.057410 env[1396]: time="2024-02-09T10:00:32.056910478Z" level=info msg="TearDown network for sandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" successfully" Feb 9 10:00:32.090590 env[1396]: time="2024-02-09T10:00:32.090530056Z" level=info msg="RemovePodSandbox \"f901689eef372cf951a447cd4f2f69c07c2fa9162ddc0369faf8705d83f2e19d\" returns successfully" Feb 9 10:00:32.091214 env[1396]: time="2024-02-09T10:00:32.091166994Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 10:00:32.101047 env[1396]: time="2024-02-09T10:00:32.100983508Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:32.110184 env[1396]: time="2024-02-09T10:00:32.109424463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:32.115753 env[1396]: time="2024-02-09T10:00:32.115705679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:32.120824 env[1396]: time="2024-02-09T10:00:32.120756859Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:32.121358 env[1396]: time="2024-02-09T10:00:32.121328675Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:00:32.124038 env[1396]: time="2024-02-09T10:00:32.122644832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 10:00:32.127507 env[1396]: time="2024-02-09T10:00:32.127452966Z" level=info msg="CreateContainer within sandbox \"4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:00:32.186548 env[1396]: time="2024-02-09T10:00:32.186491254Z" level=info msg="CreateContainer within sandbox \"4289352b241fa8f0394b34bb0a1ec925ad4d8459124930bc10de4c63a1edf363\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb\"" Feb 9 10:00:32.187832 env[1396]: time="2024-02-09T10:00:32.187792010Z" level=info msg="StartContainer for \"217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb\"" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.143 [WARNING][4893] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0", GenerateName:"calico-kube-controllers-7c5b8c587-", Namespace:"calico-system", SelfLink:"", UID:"1b6d7951-aa49-4451-91fd-195e425271d6", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5b8c587", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025", Pod:"calico-kube-controllers-7c5b8c587-msd4t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd2b50b5ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.144 [INFO][4893] k8s.go 578: Cleaning up netns ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.144 [INFO][4893] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" iface="eth0" netns="" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.144 [INFO][4893] k8s.go 585: Releasing IP address(es) ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.144 [INFO][4893] utils.go 188: Calico CNI releasing IP address ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.172 [INFO][4900] ipam_plugin.go 415: Releasing address using handleID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.172 [INFO][4900] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.172 [INFO][4900] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.183 [WARNING][4900] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.184 [INFO][4900] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.185 [INFO][4900] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:32.192232 env[1396]: 2024-02-09 10:00:32.190 [INFO][4893] k8s.go 591: Teardown processing complete. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.192798 env[1396]: time="2024-02-09T10:00:32.192746468Z" level=info msg="TearDown network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" successfully" Feb 9 10:00:32.192883 env[1396]: time="2024-02-09T10:00:32.192866752Z" level=info msg="StopPodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" returns successfully" Feb 9 10:00:32.193499 env[1396]: time="2024-02-09T10:00:32.193461368Z" level=info msg="RemovePodSandbox for \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 10:00:32.193604 env[1396]: time="2024-02-09T10:00:32.193502009Z" level=info msg="Forcibly stopping sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\"" Feb 9 10:00:32.216699 systemd[1]: Started cri-containerd-217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb.scope. Feb 9 10:00:32.223494 systemd[1]: run-containerd-runc-k8s.io-217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb-runc.2JQmY4.mount: Deactivated successfully. Feb 9 10:00:32.273282 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:00:32.273443 kernel: audit: type=1400 audit(1707472832.244:1199): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.295924 kernel: audit: type=1400 audit(1707472832.245:1200): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.321104 kernel: audit: type=1400 audit(1707472832.245:1201): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.342768 kernel: audit: type=1400 audit(1707472832.245:1202): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.344269 kernel: audit: type=1400 audit(1707472832.245:1203): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.388284 kernel: audit: type=1400 audit(1707472832.245:1204): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.411797 kernel: audit: type=1400 audit(1707472832.245:1205): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.438749 kernel: audit: type=1400 audit(1707472832.245:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.460395 kernel: audit: type=1400 audit(1707472832.245:1207): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.489221 kernel: audit: type=1400 audit(1707472832.245:1208): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.245000 audit: BPF prog-id=191 op=LOAD Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4577 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376335383130613838333333386338313533313033386662313131 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4577 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376335383130613838333333386338313533313033386662313131 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.250000 audit: BPF prog-id=192 op=LOAD Feb 9 10:00:32.250000 audit[4924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4577 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376335383130613838333333386338313533313033386662313131 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.252000 audit: BPF prog-id=193 op=LOAD Feb 9 10:00:32.252000 audit[4924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4577 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376335383130613838333333386338313533313033386662313131 Feb 9 10:00:32.275000 audit: BPF prog-id=193 op=UNLOAD Feb 9 10:00:32.275000 audit: BPF prog-id=192 op=UNLOAD Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { perfmon } for pid=4924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit[4924]: AVC avc: denied { bpf } for pid=4924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:32.275000 audit: BPF prog-id=194 op=LOAD Feb 9 10:00:32.275000 audit[4924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4577 pid=4924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231376335383130613838333333386338313533313033386662313131 Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.344 [WARNING][4930] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0", GenerateName:"calico-kube-controllers-7c5b8c587-", Namespace:"calico-system", SelfLink:"", UID:"1b6d7951-aa49-4451-91fd-195e425271d6", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7c5b8c587", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-ee2552a568", ContainerID:"630f02a5dc6f39b333765a7e7a57641f1de9ecf1395948781aa8213fc44bc025", Pod:"calico-kube-controllers-7c5b8c587-msd4t", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.99.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califd2b50b5ce2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.345 [INFO][4930] k8s.go 578: Cleaning up netns ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.345 [INFO][4930] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" iface="eth0" netns="" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.345 [INFO][4930] k8s.go 585: Releasing IP address(es) ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.345 [INFO][4930] utils.go 188: Calico CNI releasing IP address ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.431 [INFO][4953] ipam_plugin.go 415: Releasing address using handleID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.431 [INFO][4953] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.434 [INFO][4953] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.461 [WARNING][4953] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.462 [INFO][4953] ipam_plugin.go 443: Releasing address using workloadID ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" HandleID="k8s-pod-network.20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Workload="ci--3510.3.2--a--ee2552a568-k8s-calico--kube--controllers--7c5b8c587--msd4t-eth0" Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.465 [INFO][4953] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:32.502020 env[1396]: 2024-02-09 10:00:32.500 [INFO][4930] k8s.go 591: Teardown processing complete. ContainerID="20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6" Feb 9 10:00:32.502825 env[1396]: time="2024-02-09T10:00:32.502776559Z" level=info msg="TearDown network for sandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" successfully" Feb 9 10:00:32.507914 env[1396]: time="2024-02-09T10:00:32.507845821Z" level=info msg="StartContainer for \"217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb\" returns successfully" Feb 9 10:00:32.514185 env[1396]: time="2024-02-09T10:00:32.514127276Z" level=info msg="RemovePodSandbox \"20c2cccef1df859930483ce0691ba983b7ac1607ae9e15968963bc2f898487c6\" returns successfully" Feb 9 10:00:32.601003 kubelet[2492]: I0209 10:00:32.600950 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bf8847459-cksk7" podStartSLOduration=2.056867112 podCreationTimestamp="2024-02-09 10:00:11 +0000 UTC" firstStartedPulling="2024-02-09 10:00:12.578453403 +0000 UTC m=+101.649083277" lastFinishedPulling="2024-02-09 10:00:32.122483108 +0000 UTC m=+121.193112982" observedRunningTime="2024-02-09 10:00:32.598730237 +0000 UTC m=+121.669360111" watchObservedRunningTime="2024-02-09 10:00:32.600896817 +0000 UTC m=+121.671526651" Feb 9 10:00:32.677000 audit[4976]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:32.677000 audit[4976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd1e2d950 a2=0 a3=ffff9230d6c0 items=0 ppid=2664 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:32.678000 audit[4976]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4976 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:32.678000 audit[4976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd1e2d950 a2=0 a3=ffff9230d6c0 items=0 ppid=2664 pid=4976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:32.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:33.691000 audit[4944]: AVC avc: denied { watch } for pid=4944 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.3339639244/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c141,c581 tclass=file permissive=0 Feb 9 10:00:33.691000 audit[4944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000e50e40 a2=fc6 a3=0 items=0 ppid=4577 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 key=(null) Feb 9 10:00:33.691000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:34.510733 env[1396]: time="2024-02-09T10:00:34.510685379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:34.518633 env[1396]: time="2024-02-09T10:00:34.518588392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:34.522925 env[1396]: time="2024-02-09T10:00:34.522883108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:34.530463 env[1396]: time="2024-02-09T10:00:34.530417311Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:34.531629 env[1396]: time="2024-02-09T10:00:34.531597663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 10:00:34.535027 env[1396]: time="2024-02-09T10:00:34.534536902Z" level=info msg="CreateContainer within sandbox \"43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 10:00:34.565967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2877883768.mount: Deactivated successfully. Feb 9 10:00:34.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.33:22-10.200.12.6:37120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:34.572718 systemd[1]: Started sshd@8-10.200.20.33:22-10.200.12.6:37120.service. Feb 9 10:00:34.586547 env[1396]: time="2024-02-09T10:00:34.586497145Z" level=info msg="CreateContainer within sandbox \"43028e282518a852e6271724c60a0de3b95b6bd2d043b99b24dac5899e0cfd14\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf\"" Feb 9 10:00:34.587677 env[1396]: time="2024-02-09T10:00:34.587638256Z" level=info msg="StartContainer for \"1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf\"" Feb 9 10:00:34.608941 systemd[1]: Started cri-containerd-1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf.scope. Feb 9 10:00:34.616232 systemd[1]: run-containerd-runc-k8s.io-1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf-runc.LEIcyC.mount: Deactivated successfully. Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.641000 audit: BPF prog-id=195 op=LOAD Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4617 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:34.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383732303365653565646135653563666531386337633866393232 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4617 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:34.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383732303365653565646135653563666531386337633866393232 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit: BPF prog-id=196 op=LOAD Feb 9 10:00:34.642000 audit[4988]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4617 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:34.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383732303365653565646135653563666531386337633866393232 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit: BPF prog-id=197 op=LOAD Feb 9 10:00:34.642000 audit[4988]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4617 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:34.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383732303365653565646135653563666531386337633866393232 Feb 9 10:00:34.642000 audit: BPF prog-id=197 op=UNLOAD Feb 9 10:00:34.642000 audit: BPF prog-id=196 op=UNLOAD Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { perfmon } for pid=4988 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit[4988]: AVC avc: denied { bpf } for pid=4988 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:34.642000 audit: BPF prog-id=198 op=LOAD Feb 9 10:00:34.642000 audit[4988]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4617 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:34.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383732303365653565646135653563666531386337633866393232 Feb 9 10:00:34.687416 env[1396]: time="2024-02-09T10:00:34.687351467Z" level=info msg="StartContainer for \"1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf\" returns successfully" Feb 9 10:00:35.034000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.035348 sshd[4978]: Accepted publickey for core from 10.200.12.6 port 37120 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:35.035000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.035000 audit[4978]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea2cc190 a2=3 a3=1 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:35.035000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:35.037057 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:35.041769 systemd[1]: Started session-11.scope. Feb 9 10:00:35.042697 systemd-logind[1374]: New session 11 of user core. Feb 9 10:00:35.050000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.051000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.479020 sshd[4978]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:35.478000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.479000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:35.482015 systemd-logind[1374]: Session 11 logged out. Waiting for processes to exit. Feb 9 10:00:35.482230 systemd[1]: sshd@8-10.200.20.33:22-10.200.12.6:37120.service: Deactivated successfully. Feb 9 10:00:35.483033 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 10:00:35.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.33:22-10.200.12.6:37120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:35.483905 systemd-logind[1374]: Removed session 11. Feb 9 10:00:35.637000 audit[5030]: NETFILTER_CFG table=filter:125 family=2 entries=10 op=nft_register_rule pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:35.637000 audit[5030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe0a46580 a2=0 a3=ffff9c64f6c0 items=0 ppid=2664 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:35.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:35.640000 audit[5030]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=5030 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:35.640000 audit[5030]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe0a46580 a2=0 a3=ffff9c64f6c0 items=0 ppid=2664 pid=5030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:35.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:35.904000 audit[4999]: AVC avc: denied { watch } for pid=4999 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.2178367230/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c905,c925 tclass=file permissive=0 Feb 9 10:00:35.904000 audit[4999]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ee6f40 a2=fc6 a3=0 items=0 ppid=4617 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 key=(null) Feb 9 10:00:35.904000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:00:38.729841 systemd[1]: run-containerd-runc-k8s.io-854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466-runc.2EBXOM.mount: Deactivated successfully. Feb 9 10:00:40.541857 systemd[1]: Started sshd@9-10.200.20.33:22-10.200.12.6:44090.service. Feb 9 10:00:40.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.12.6:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:40.549397 kernel: kauditd_printk_skb: 133 callbacks suppressed Feb 9 10:00:40.578358 kernel: audit: type=1130 audit(1707472840.541:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.12.6:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:40.996000 audit[5055]: USER_ACCT pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:40.996983 sshd[5055]: Accepted publickey for core from 10.200.12.6 port 44090 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:40.998890 sshd[5055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:40.998000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.053520 kernel: audit: type=1101 audit(1707472840.996:1251): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.053681 kernel: audit: type=1103 audit(1707472840.998:1252): pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.071360 kernel: audit: type=1006 audit(1707472840.998:1253): pid=5055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 10:00:40.998000 audit[5055]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce331300 a2=3 a3=1 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:41.075544 systemd-logind[1374]: New session 12 of user core. Feb 9 10:00:41.076253 systemd[1]: Started session-12.scope. Feb 9 10:00:41.105269 kernel: audit: type=1300 audit(1707472840.998:1253): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce331300 a2=3 a3=1 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:40.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:41.116466 kernel: audit: type=1327 audit(1707472840.998:1253): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:41.081000 audit[5055]: USER_START pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.154723 kernel: audit: type=1105 audit(1707472841.081:1254): pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.083000 audit[5057]: CRED_ACQ pid=5057 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.184135 kernel: audit: type=1103 audit(1707472841.083:1255): pid=5057 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.402334 sshd[5055]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:41.404000 audit[5055]: USER_END pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.407364 systemd-logind[1374]: Session 12 logged out. Waiting for processes to exit. Feb 9 10:00:41.408770 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 10:00:41.410191 systemd-logind[1374]: Removed session 12. Feb 9 10:00:41.411002 systemd[1]: sshd@9-10.200.20.33:22-10.200.12.6:44090.service: Deactivated successfully. Feb 9 10:00:41.405000 audit[5055]: CRED_DISP pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.465047 kernel: audit: type=1106 audit(1707472841.404:1256): pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.465215 kernel: audit: type=1104 audit(1707472841.405:1257): pid=5055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:41.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.12.6:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:42.131149 systemd[1]: run-containerd-runc-k8s.io-217c5810a883338c81531038fb111eba1b01cc284d73e771a1aac7ecb0e6ccdb-runc.b4hX3Z.mount: Deactivated successfully. Feb 9 10:00:42.191444 kubelet[2492]: I0209 10:00:42.191055 2492 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bf8847459-h4b5k" podStartSLOduration=9.244080941 podCreationTimestamp="2024-02-09 10:00:11 +0000 UTC" firstStartedPulling="2024-02-09 10:00:12.585607961 +0000 UTC m=+101.656237835" lastFinishedPulling="2024-02-09 10:00:34.532539729 +0000 UTC m=+123.603169603" observedRunningTime="2024-02-09 10:00:35.619145337 +0000 UTC m=+124.689775211" watchObservedRunningTime="2024-02-09 10:00:42.191012709 +0000 UTC m=+131.261642583" Feb 9 10:00:42.229000 audit[5107]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5107 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:42.229000 audit[5107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffef3330e0 a2=0 a3=ffff9a7d86c0 items=0 ppid=2664 pid=5107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:42.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:42.231000 audit[5107]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_register_chain pid=5107 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:42.231000 audit[5107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffef3330e0 a2=0 a3=ffff9a7d86c0 items=0 ppid=2664 pid=5107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:42.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:42.261000 audit[5109]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=5109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:42.261000 audit[5109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe13d0d10 a2=0 a3=ffff892166c0 items=0 ppid=2664 pid=5109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:42.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:42.266000 audit[5109]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=5109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:42.266000 audit[5109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=ffffe13d0d10 a2=0 a3=ffff892166c0 items=0 ppid=2664 pid=5109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:42.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:44.808000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:44.808000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013f3520 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:44.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40028d2dc0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40013f3540 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:44.810000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:00:44.810000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013f3560 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:00:44.810000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:00:45.323342 systemd[1]: run-containerd-runc-k8s.io-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e-runc.ZvMtxV.mount: Deactivated successfully. Feb 9 10:00:46.476919 systemd[1]: Started sshd@10-10.200.20.33:22-10.200.12.6:44100.service. Feb 9 10:00:46.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.12.6:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:46.484738 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 10:00:46.484877 kernel: audit: type=1130 audit(1707472846.477:1267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.12.6:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:46.925000 audit[5131]: USER_ACCT pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:46.926766 sshd[5131]: Accepted publickey for core from 10.200.12.6 port 44100 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:46.957697 sshd[5131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:46.956000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:46.986142 kernel: audit: type=1101 audit(1707472846.925:1268): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:46.986304 kernel: audit: type=1103 audit(1707472846.956:1269): pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.003627 kernel: audit: type=1006 audit(1707472846.956:1270): pid=5131 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 10:00:46.956000 audit[5131]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73890d0 a2=3 a3=1 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:47.032444 kernel: audit: type=1300 audit(1707472846.956:1270): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc73890d0 a2=3 a3=1 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:46.956000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:47.042425 kernel: audit: type=1327 audit(1707472846.956:1270): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:47.047485 systemd-logind[1374]: New session 13 of user core. Feb 9 10:00:47.047980 systemd[1]: Started session-13.scope. Feb 9 10:00:47.052000 audit[5131]: USER_START pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.086000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.112853 kernel: audit: type=1105 audit(1707472847.052:1271): pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.113004 kernel: audit: type=1103 audit(1707472847.086:1272): pid=5133 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.405269 sshd[5131]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:47.405000 audit[5131]: USER_END pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.408440 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 10:00:47.409465 systemd[1]: sshd@10-10.200.20.33:22-10.200.12.6:44100.service: Deactivated successfully. Feb 9 10:00:47.405000 audit[5131]: CRED_DISP pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.438898 systemd-logind[1374]: Session 13 logged out. Waiting for processes to exit. Feb 9 10:00:47.439902 systemd-logind[1374]: Removed session 13. Feb 9 10:00:47.463814 kernel: audit: type=1106 audit(1707472847.405:1273): pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.463973 kernel: audit: type=1104 audit(1707472847.405:1274): pid=5131 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:47.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.12.6:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:52.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.33:22-10.200.12.6:37744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:52.482302 systemd[1]: Started sshd@11-10.200.20.33:22-10.200.12.6:37744.service. Feb 9 10:00:52.488809 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:00:52.488957 kernel: audit: type=1130 audit(1707472852.481:1276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.33:22-10.200.12.6:37744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:52.931000 audit[5147]: USER_ACCT pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:52.932751 sshd[5147]: Accepted publickey for core from 10.200.12.6 port 37744 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:52.963405 sshd[5147]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:52.961000 audit[5147]: CRED_ACQ pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:52.991540 kernel: audit: type=1101 audit(1707472852.931:1277): pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:52.991690 kernel: audit: type=1103 audit(1707472852.961:1278): pid=5147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.009374 kernel: audit: type=1006 audit(1707472852.961:1279): pid=5147 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 10:00:52.961000 audit[5147]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee84ce20 a2=3 a3=1 items=0 ppid=1 pid=5147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:53.044356 kernel: audit: type=1300 audit(1707472852.961:1279): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee84ce20 a2=3 a3=1 items=0 ppid=1 pid=5147 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:52.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:53.054207 systemd-logind[1374]: New session 14 of user core. Feb 9 10:00:53.054988 systemd[1]: Started session-14.scope. Feb 9 10:00:53.063154 kernel: audit: type=1327 audit(1707472852.961:1279): proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:53.064000 audit[5147]: USER_START pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.068000 audit[5151]: CRED_ACQ pid=5151 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.124904 kernel: audit: type=1105 audit(1707472853.064:1280): pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.125063 kernel: audit: type=1103 audit(1707472853.068:1281): pid=5151 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.401370 sshd[5147]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:53.401000 audit[5147]: USER_END pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.406501 systemd-logind[1374]: Session 14 logged out. Waiting for processes to exit. Feb 9 10:00:53.408098 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 10:00:53.409336 systemd-logind[1374]: Removed session 14. Feb 9 10:00:53.410196 systemd[1]: sshd@11-10.200.20.33:22-10.200.12.6:37744.service: Deactivated successfully. Feb 9 10:00:53.403000 audit[5147]: CRED_DISP pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.461636 kernel: audit: type=1106 audit(1707472853.401:1282): pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.461786 kernel: audit: type=1104 audit(1707472853.403:1283): pid=5147 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.33:22-10.200.12.6:37744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:53.482880 systemd[1]: Started sshd@12-10.200.20.33:22-10.200.12.6:37752.service. Feb 9 10:00:53.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.33:22-10.200.12.6:37752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:53.899516 sshd[5162]: Accepted publickey for core from 10.200.12.6 port 37752 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:53.898000 audit[5162]: USER_ACCT pid=5162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.901485 sshd[5162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:53.899000 audit[5162]: CRED_ACQ pid=5162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.900000 audit[5162]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff117c080 a2=3 a3=1 items=0 ppid=1 pid=5162 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:53.900000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:53.906652 systemd[1]: Started session-15.scope. Feb 9 10:00:53.906997 systemd-logind[1374]: New session 15 of user core. Feb 9 10:00:53.910000 audit[5162]: USER_START pid=5162 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:53.912000 audit[5164]: CRED_ACQ pid=5164 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.141850 sshd[5162]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:55.142000 audit[5162]: USER_END pid=5162 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.142000 audit[5162]: CRED_DISP pid=5162 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.145424 systemd-logind[1374]: Session 15 logged out. Waiting for processes to exit. Feb 9 10:00:55.145604 systemd[1]: sshd@12-10.200.20.33:22-10.200.12.6:37752.service: Deactivated successfully. Feb 9 10:00:55.146444 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 10:00:55.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.33:22-10.200.12.6:37752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:55.147368 systemd-logind[1374]: Removed session 15. Feb 9 10:00:55.212309 systemd[1]: Started sshd@13-10.200.20.33:22-10.200.12.6:37768.service. Feb 9 10:00:55.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.33:22-10.200.12.6:37768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:55.630000 audit[5172]: USER_ACCT pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.631738 sshd[5172]: Accepted publickey for core from 10.200.12.6 port 37768 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:00:55.631000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.632000 audit[5172]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff35384d0 a2=3 a3=1 items=0 ppid=1 pid=5172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:55.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:00:55.633723 sshd[5172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:00:55.639283 systemd[1]: Started session-16.scope. Feb 9 10:00:55.640231 systemd-logind[1374]: New session 16 of user core. Feb 9 10:00:55.643000 audit[5172]: USER_START pid=5172 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:55.645000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.013921 sshd[5172]: pam_unix(sshd:session): session closed for user core Feb 9 10:00:56.014000 audit[5172]: USER_END pid=5172 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.014000 audit[5172]: CRED_DISP pid=5172 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:00:56.017067 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 10:00:56.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.33:22-10.200.12.6:37768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:00:56.017881 systemd-logind[1374]: Session 16 logged out. Waiting for processes to exit. Feb 9 10:00:56.018084 systemd[1]: sshd@13-10.200.20.33:22-10.200.12.6:37768.service: Deactivated successfully. Feb 9 10:00:56.019460 systemd-logind[1374]: Removed session 16. Feb 9 10:01:01.097232 systemd[1]: Started sshd@14-10.200.20.33:22-10.200.12.6:51456.service. Feb 9 10:01:01.129835 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 10:01:01.129981 kernel: audit: type=1130 audit(1707472861.096:1303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.12.6:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:01.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.12.6:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:01.551000 audit[5205]: USER_ACCT pid=5205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.553815 sshd[5205]: Accepted publickey for core from 10.200.12.6 port 51456 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:01.555766 sshd[5205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:01.554000 audit[5205]: CRED_ACQ pid=5205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.610892 kernel: audit: type=1101 audit(1707472861.551:1304): pid=5205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.611191 kernel: audit: type=1103 audit(1707472861.554:1305): pid=5205 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.630394 kernel: audit: type=1006 audit(1707472861.554:1306): pid=5205 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 10:01:01.554000 audit[5205]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4f90a70 a2=3 a3=1 items=0 ppid=1 pid=5205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:01.662737 kernel: audit: type=1300 audit(1707472861.554:1306): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4f90a70 a2=3 a3=1 items=0 ppid=1 pid=5205 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:01.554000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:01.674344 kernel: audit: type=1327 audit(1707472861.554:1306): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:01.678547 systemd-logind[1374]: New session 17 of user core. Feb 9 10:01:01.678977 systemd[1]: Started session-17.scope. Feb 9 10:01:01.682000 audit[5205]: USER_START pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.723114 kernel: audit: type=1105 audit(1707472861.682:1307): pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.722000 audit[5207]: CRED_ACQ pid=5207 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:01.754128 kernel: audit: type=1103 audit(1707472861.722:1308): pid=5207 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:02.056393 sshd[5205]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:02.056000 audit[5205]: USER_END pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:02.089634 systemd[1]: sshd@14-10.200.20.33:22-10.200.12.6:51456.service: Deactivated successfully. Feb 9 10:01:02.090522 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 10:01:02.091982 systemd-logind[1374]: Session 17 logged out. Waiting for processes to exit. Feb 9 10:01:02.093063 systemd-logind[1374]: Removed session 17. Feb 9 10:01:02.056000 audit[5205]: CRED_DISP pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:02.119422 kernel: audit: type=1106 audit(1707472862.056:1309): pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:02.119574 kernel: audit: type=1104 audit(1707472862.056:1310): pid=5205 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:02.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.12.6:51456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:07.129122 systemd[1]: Started sshd@15-10.200.20.33:22-10.200.12.6:40530.service. Feb 9 10:01:07.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.33:22-10.200.12.6:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:07.135892 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:07.160771 kernel: audit: type=1130 audit(1707472867.128:1312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.33:22-10.200.12.6:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:07.546000 audit[5220]: USER_ACCT pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.548276 sshd[5220]: Accepted publickey for core from 10.200.12.6 port 40530 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:07.580984 kernel: audit: type=1101 audit(1707472867.546:1313): pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.581181 kernel: audit: type=1103 audit(1707472867.577:1314): pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.577000 audit[5220]: CRED_ACQ pid=5220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.578872 sshd[5220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:07.623518 kernel: audit: type=1006 audit(1707472867.577:1315): pid=5220 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 10:01:07.623681 kernel: audit: type=1300 audit(1707472867.577:1315): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4ad2720 a2=3 a3=1 items=0 ppid=1 pid=5220 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:07.577000 audit[5220]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4ad2720 a2=3 a3=1 items=0 ppid=1 pid=5220 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:07.663260 kernel: audit: type=1327 audit(1707472867.577:1315): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:07.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:07.663959 systemd-logind[1374]: New session 18 of user core. Feb 9 10:01:07.664057 systemd[1]: Started session-18.scope. Feb 9 10:01:07.667000 audit[5220]: USER_START pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.700000 audit[5222]: CRED_ACQ pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.728146 kernel: audit: type=1105 audit(1707472867.667:1316): pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:07.728285 kernel: audit: type=1103 audit(1707472867.700:1317): pid=5222 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:08.014285 sshd[5220]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:08.014000 audit[5220]: USER_END pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:08.049557 systemd[1]: sshd@15-10.200.20.33:22-10.200.12.6:40530.service: Deactivated successfully. Feb 9 10:01:08.050450 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 10:01:08.014000 audit[5220]: CRED_DISP pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:08.051590 systemd-logind[1374]: Session 18 logged out. Waiting for processes to exit. Feb 9 10:01:08.080168 kernel: audit: type=1106 audit(1707472868.014:1318): pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:08.080332 kernel: audit: type=1104 audit(1707472868.014:1319): pid=5220 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:08.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.33:22-10.200.12.6:40530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:08.081272 systemd-logind[1374]: Removed session 18. Feb 9 10:01:13.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.33:22-10.200.12.6:40540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:13.087019 systemd[1]: Started sshd@16-10.200.20.33:22-10.200.12.6:40540.service. Feb 9 10:01:13.093313 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:13.093419 kernel: audit: type=1130 audit(1707472873.086:1321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.33:22-10.200.12.6:40540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:13.500000 audit[5298]: USER_ACCT pid=5298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.502250 sshd[5298]: Accepted publickey for core from 10.200.12.6 port 40540 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:13.504281 sshd[5298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:13.502000 audit[5298]: CRED_ACQ pid=5298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.559697 kernel: audit: type=1101 audit(1707472873.500:1322): pid=5298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.559852 kernel: audit: type=1103 audit(1707472873.502:1323): pid=5298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.560115 kernel: audit: type=1006 audit(1707472873.502:1324): pid=5298 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 9 10:01:13.502000 audit[5298]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd02a67d0 a2=3 a3=1 items=0 ppid=1 pid=5298 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:13.605712 kernel: audit: type=1300 audit(1707472873.502:1324): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd02a67d0 a2=3 a3=1 items=0 ppid=1 pid=5298 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:13.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:13.616490 kernel: audit: type=1327 audit(1707472873.502:1324): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:13.619176 systemd-logind[1374]: New session 19 of user core. Feb 9 10:01:13.620273 systemd[1]: Started session-19.scope. Feb 9 10:01:13.624000 audit[5298]: USER_START pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.626000 audit[5300]: CRED_ACQ pid=5300 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.659395 kernel: audit: type=1105 audit(1707472873.624:1325): pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.686125 kernel: audit: type=1103 audit(1707472873.626:1326): pid=5300 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.942149 sshd[5298]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:13.942000 audit[5298]: USER_END pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.942000 audit[5298]: CRED_DISP pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.976405 systemd-logind[1374]: Session 19 logged out. Waiting for processes to exit. Feb 9 10:01:13.977370 systemd[1]: sshd@16-10.200.20.33:22-10.200.12.6:40540.service: Deactivated successfully. Feb 9 10:01:13.978241 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 10:01:13.979769 systemd-logind[1374]: Removed session 19. Feb 9 10:01:14.000015 kernel: audit: type=1106 audit(1707472873.942:1327): pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:14.000143 kernel: audit: type=1104 audit(1707472873.942:1328): pid=5298 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:13.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.33:22-10.200.12.6:40540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:19.014556 systemd[1]: Started sshd@17-10.200.20.33:22-10.200.12.6:36856.service. Feb 9 10:01:19.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.33:22-10.200.12.6:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:19.020892 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:19.020968 kernel: audit: type=1130 audit(1707472879.013:1330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.33:22-10.200.12.6:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:19.429000 audit[5312]: USER_ACCT pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.430571 sshd[5312]: Accepted publickey for core from 10.200.12.6 port 36856 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:19.460122 kernel: audit: type=1101 audit(1707472879.429:1331): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.461044 sshd[5312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:19.459000 audit[5312]: CRED_ACQ pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.493070 systemd-logind[1374]: New session 20 of user core. Feb 9 10:01:19.493227 systemd[1]: Started session-20.scope. Feb 9 10:01:19.506349 kernel: audit: type=1103 audit(1707472879.459:1332): pid=5312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.506457 kernel: audit: type=1006 audit(1707472879.459:1333): pid=5312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 10:01:19.459000 audit[5312]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc085ced0 a2=3 a3=1 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:19.535443 kernel: audit: type=1300 audit(1707472879.459:1333): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc085ced0 a2=3 a3=1 items=0 ppid=1 pid=5312 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:19.459000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:19.544837 kernel: audit: type=1327 audit(1707472879.459:1333): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:19.507000 audit[5312]: USER_START pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.576272 kernel: audit: type=1105 audit(1707472879.507:1334): pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.508000 audit[5314]: CRED_ACQ pid=5314 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.600830 kernel: audit: type=1103 audit(1707472879.508:1335): pid=5314 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.831403 sshd[5312]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:19.831000 audit[5312]: USER_END pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.835225 systemd-logind[1374]: Session 20 logged out. Waiting for processes to exit. Feb 9 10:01:19.836603 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 10:01:19.837872 systemd-logind[1374]: Removed session 20. Feb 9 10:01:19.838631 systemd[1]: sshd@17-10.200.20.33:22-10.200.12.6:36856.service: Deactivated successfully. Feb 9 10:01:19.832000 audit[5312]: CRED_DISP pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.889404 kernel: audit: type=1106 audit(1707472879.831:1336): pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.889726 kernel: audit: type=1104 audit(1707472879.832:1337): pid=5312 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:19.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.33:22-10.200.12.6:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:19.911513 systemd[1]: Started sshd@18-10.200.20.33:22-10.200.12.6:36864.service. Feb 9 10:01:19.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.33:22-10.200.12.6:36864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:20.360000 audit[5323]: USER_ACCT pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.361698 sshd[5323]: Accepted publickey for core from 10.200.12.6 port 36864 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:20.361000 audit[5323]: CRED_ACQ pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.362000 audit[5323]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff09e7760 a2=3 a3=1 items=0 ppid=1 pid=5323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:20.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:20.363410 sshd[5323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:20.367987 systemd[1]: Started session-21.scope. Feb 9 10:01:20.368350 systemd-logind[1374]: New session 21 of user core. Feb 9 10:01:20.372000 audit[5323]: USER_START pid=5323 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.373000 audit[5325]: CRED_ACQ pid=5325 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.831445 sshd[5323]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:20.831000 audit[5323]: USER_END pid=5323 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.831000 audit[5323]: CRED_DISP pid=5323 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:20.835143 systemd-logind[1374]: Session 21 logged out. Waiting for processes to exit. Feb 9 10:01:20.835262 systemd[1]: sshd@18-10.200.20.33:22-10.200.12.6:36864.service: Deactivated successfully. Feb 9 10:01:20.836101 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 10:01:20.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.33:22-10.200.12.6:36864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:20.837040 systemd-logind[1374]: Removed session 21. Feb 9 10:01:20.902578 systemd[1]: Started sshd@19-10.200.20.33:22-10.200.12.6:36866.service. Feb 9 10:01:20.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.33:22-10.200.12.6:36866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:21.317000 audit[5332]: USER_ACCT pid=5332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:21.319184 sshd[5332]: Accepted publickey for core from 10.200.12.6 port 36866 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:21.319000 audit[5332]: CRED_ACQ pid=5332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:21.319000 audit[5332]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdabfe770 a2=3 a3=1 items=0 ppid=1 pid=5332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:21.319000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:21.320892 sshd[5332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:21.325567 systemd[1]: Started session-22.scope. Feb 9 10:01:21.325902 systemd-logind[1374]: New session 22 of user core. Feb 9 10:01:21.329000 audit[5332]: USER_START pid=5332 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:21.330000 audit[5334]: CRED_ACQ pid=5334 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:22.487000 audit[5358]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:22.487000 audit[5358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc5f05f50 a2=0 a3=ffffbca0b6c0 items=0 ppid=2664 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:22.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:22.488000 audit[5358]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:22.488000 audit[5358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffc5f05f50 a2=0 a3=ffffbca0b6c0 items=0 ppid=2664 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:22.488000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:22.520000 audit[5360]: NETFILTER_CFG table=filter:133 family=2 entries=32 op=nft_register_rule pid=5360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:22.520000 audit[5360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc7510200 a2=0 a3=ffffbd29b6c0 items=0 ppid=2664 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:22.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:22.524000 audit[5360]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:22.524000 audit[5360]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffc7510200 a2=0 a3=ffffbd29b6c0 items=0 ppid=2664 pid=5360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:22.524000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:22.573566 sshd[5332]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:22.574000 audit[5332]: USER_END pid=5332 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:22.574000 audit[5332]: CRED_DISP pid=5332 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:22.577143 systemd[1]: sshd@19-10.200.20.33:22-10.200.12.6:36866.service: Deactivated successfully. Feb 9 10:01:22.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.33:22-10.200.12.6:36866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:22.578483 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 10:01:22.579394 systemd-logind[1374]: Session 22 logged out. Waiting for processes to exit. Feb 9 10:01:22.580776 systemd-logind[1374]: Removed session 22. Feb 9 10:01:22.645718 systemd[1]: Started sshd@20-10.200.20.33:22-10.200.12.6:36868.service. Feb 9 10:01:22.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.33:22-10.200.12.6:36868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:23.067915 sshd[5363]: Accepted publickey for core from 10.200.12.6 port 36868 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:23.066000 audit[5363]: USER_ACCT pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.069848 sshd[5363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:23.068000 audit[5363]: CRED_ACQ pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.068000 audit[5363]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea28d8c0 a2=3 a3=1 items=0 ppid=1 pid=5363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:23.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:23.075563 systemd-logind[1374]: New session 23 of user core. Feb 9 10:01:23.076245 systemd[1]: Started session-23.scope. Feb 9 10:01:23.079000 audit[5363]: USER_START pid=5363 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.081000 audit[5365]: CRED_ACQ pid=5365 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.666200 sshd[5363]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:23.666000 audit[5363]: USER_END pid=5363 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.666000 audit[5363]: CRED_DISP pid=5363 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:23.669828 systemd-logind[1374]: Session 23 logged out. Waiting for processes to exit. Feb 9 10:01:23.669995 systemd[1]: sshd@20-10.200.20.33:22-10.200.12.6:36868.service: Deactivated successfully. Feb 9 10:01:23.670853 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 10:01:23.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.33:22-10.200.12.6:36868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:23.671705 systemd-logind[1374]: Removed session 23. Feb 9 10:01:23.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.12.6:36878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:23.742534 systemd[1]: Started sshd@21-10.200.20.33:22-10.200.12.6:36878.service. Feb 9 10:01:24.157580 sshd[5373]: Accepted publickey for core from 10.200.12.6 port 36878 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:24.156000 audit[5373]: USER_ACCT pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.163473 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 10:01:24.163627 kernel: audit: type=1101 audit(1707472884.156:1371): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.164545 sshd[5373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:24.162000 audit[5373]: CRED_ACQ pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.220049 kernel: audit: type=1103 audit(1707472884.162:1372): pid=5373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.238586 kernel: audit: type=1006 audit(1707472884.162:1373): pid=5373 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 10:01:24.162000 audit[5373]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe12d3e10 a2=3 a3=1 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:24.243008 systemd-logind[1374]: New session 24 of user core. Feb 9 10:01:24.269500 systemd[1]: Started session-24.scope. Feb 9 10:01:24.162000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:24.279168 kernel: audit: type=1300 audit(1707472884.162:1373): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe12d3e10 a2=3 a3=1 items=0 ppid=1 pid=5373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:24.279264 kernel: audit: type=1327 audit(1707472884.162:1373): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:24.279000 audit[5373]: USER_START pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.281101 kernel: audit: type=1105 audit(1707472884.279:1374): pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.281000 audit[5375]: CRED_ACQ pid=5375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.339142 kernel: audit: type=1103 audit(1707472884.281:1375): pid=5375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.597374 sshd[5373]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:24.597000 audit[5373]: USER_END pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.601346 systemd-logind[1374]: Session 24 logged out. Waiting for processes to exit. Feb 9 10:01:24.602853 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 10:01:24.604326 systemd-logind[1374]: Removed session 24. Feb 9 10:01:24.605153 systemd[1]: sshd@21-10.200.20.33:22-10.200.12.6:36878.service: Deactivated successfully. Feb 9 10:01:24.598000 audit[5373]: CRED_DISP pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.659499 kernel: audit: type=1106 audit(1707472884.597:1376): pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.659639 kernel: audit: type=1104 audit(1707472884.598:1377): pid=5373 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:24.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.12.6:36878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:24.687063 kernel: audit: type=1131 audit(1707472884.604:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.12.6:36878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:25.267000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.267000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=401417a1c0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:25.278000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.278000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dd24270 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:25.279000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.279000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400df1c630 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.279000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:25.527000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.527000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=4012fd1060 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:25.527000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.527000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dd24720 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:25.527000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:25.527000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5f a1=400dd24750 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:01:25.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:01:26.543000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:26.543000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40027e30b0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:26.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:26.544000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:26.544000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002952e20 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:26.544000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:28.917000 audit[5403]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=5403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:28.917000 audit[5403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc2c05a70 a2=0 a3=ffffb97086c0 items=0 ppid=2664 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:28.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:28.920000 audit[5403]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:01:28.920000 audit[5403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffc2c05a70 a2=0 a3=ffffb97086c0 items=0 ppid=2664 pid=5403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:28.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:01:29.673895 systemd[1]: Started sshd@22-10.200.20.33:22-10.200.12.6:46668.service. Feb 9 10:01:29.706264 kernel: kauditd_printk_skb: 30 callbacks suppressed Feb 9 10:01:29.706381 kernel: audit: type=1130 audit(1707472889.672:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.12.6:46668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:29.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.12.6:46668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:30.094000 audit[5406]: USER_ACCT pid=5406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.099273 sshd[5406]: Accepted publickey for core from 10.200.12.6 port 46668 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:30.102716 sshd[5406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:30.101000 audit[5406]: CRED_ACQ pid=5406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.153331 kernel: audit: type=1101 audit(1707472890.094:1390): pid=5406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.153486 kernel: audit: type=1103 audit(1707472890.101:1391): pid=5406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.172744 kernel: audit: type=1006 audit(1707472890.101:1392): pid=5406 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 10:01:30.101000 audit[5406]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9fc02b0 a2=3 a3=1 items=0 ppid=1 pid=5406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:30.173502 systemd-logind[1374]: New session 25 of user core. Feb 9 10:01:30.203712 kernel: audit: type=1300 audit(1707472890.101:1392): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9fc02b0 a2=3 a3=1 items=0 ppid=1 pid=5406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:30.175703 systemd[1]: Started session-25.scope. Feb 9 10:01:30.101000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:30.215069 kernel: audit: type=1327 audit(1707472890.101:1392): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:30.214000 audit[5406]: USER_START pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.248179 kernel: audit: type=1105 audit(1707472890.214:1393): pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.248367 kernel: audit: type=1103 audit(1707472890.214:1394): pid=5409 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.214000 audit[5409]: CRED_ACQ pid=5409 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.526965 sshd[5406]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:30.526000 audit[5406]: USER_END pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.526000 audit[5406]: CRED_DISP pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.587109 kernel: audit: type=1106 audit(1707472890.526:1395): pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.587242 kernel: audit: type=1104 audit(1707472890.526:1396): pid=5406 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:30.587637 systemd[1]: sshd@22-10.200.20.33:22-10.200.12.6:46668.service: Deactivated successfully. Feb 9 10:01:30.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.12.6:46668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:30.588561 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 10:01:30.589193 systemd-logind[1374]: Session 25 logged out. Waiting for processes to exit. Feb 9 10:01:30.589978 systemd-logind[1374]: Removed session 25. Feb 9 10:01:33.693000 audit[4944]: AVC avc: denied { watch } for pid=4944 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.3339639244/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c141,c581 tclass=file permissive=0 Feb 9 10:01:33.693000 audit[4944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40018a14e0 a2=fc6 a3=0 items=0 ppid=4577 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 key=(null) Feb 9 10:01:33.693000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:35.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:35.599134 systemd[1]: Started sshd@23-10.200.20.33:22-10.200.12.6:46674.service. Feb 9 10:01:35.605346 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 10:01:35.605484 kernel: audit: type=1130 audit(1707472895.598:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:35.907000 audit[4999]: AVC avc: denied { watch } for pid=4999 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.2178367230/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c905,c925 tclass=file permissive=0 Feb 9 10:01:35.907000 audit[4999]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a269c0 a2=fc6 a3=0 items=0 ppid=4617 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 key=(null) Feb 9 10:01:35.973621 kernel: audit: type=1400 audit(1707472895.907:1400): avc: denied { watch } for pid=4999 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.2178367230/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c905,c925 tclass=file permissive=0 Feb 9 10:01:35.973784 kernel: audit: type=1300 audit(1707472895.907:1400): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001a269c0 a2=fc6 a3=0 items=0 ppid=4617 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 key=(null) Feb 9 10:01:35.907000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:36.003433 kernel: audit: type=1327 audit(1707472895.907:1400): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:01:36.074000 audit[5424]: USER_ACCT pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.075785 sshd[5424]: Accepted publickey for core from 10.200.12.6 port 46674 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:36.077640 sshd[5424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:36.076000 audit[5424]: CRED_ACQ pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.131399 kernel: audit: type=1101 audit(1707472896.074:1401): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.131620 kernel: audit: type=1103 audit(1707472896.076:1402): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.137696 systemd-logind[1374]: New session 26 of user core. Feb 9 10:01:36.138711 systemd[1]: Started session-26.scope. Feb 9 10:01:36.148527 kernel: audit: type=1006 audit(1707472896.076:1403): pid=5424 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 10:01:36.076000 audit[5424]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffccb380 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:36.176975 kernel: audit: type=1300 audit(1707472896.076:1403): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffccb380 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:36.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:36.187398 kernel: audit: type=1327 audit(1707472896.076:1403): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:36.187601 kernel: audit: type=1105 audit(1707472896.143:1404): pid=5424 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.143000 audit[5424]: USER_START pid=5424 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.145000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.458529 sshd[5424]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:36.458000 audit[5424]: USER_END pid=5424 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.458000 audit[5424]: CRED_DISP pid=5424 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:36.461235 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 10:01:36.462151 systemd[1]: sshd@23-10.200.20.33:22-10.200.12.6:46674.service: Deactivated successfully. Feb 9 10:01:36.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:36.463104 systemd-logind[1374]: Session 26 logged out. Waiting for processes to exit. Feb 9 10:01:36.463829 systemd-logind[1374]: Removed session 26. Feb 9 10:01:38.731341 systemd[1]: run-containerd-runc-k8s.io-854edff47412a84d4f7a026960f6c016111a5da00cfbbdbda537d27acbd1b466-runc.IVzy2s.mount: Deactivated successfully. Feb 9 10:01:41.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.12.6:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:41.530286 systemd[1]: Started sshd@24-10.200.20.33:22-10.200.12.6:49938.service. Feb 9 10:01:41.536541 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 9 10:01:41.536582 kernel: audit: type=1130 audit(1707472901.529:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.12.6:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:41.949000 audit[5458]: USER_ACCT pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:41.950367 sshd[5458]: Accepted publickey for core from 10.200.12.6 port 49938 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:41.982051 sshd[5458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:41.982375 kernel: audit: type=1101 audit(1707472901.949:1410): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:41.982422 kernel: audit: type=1103 audit(1707472901.980:1411): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:41.980000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.026728 kernel: audit: type=1006 audit(1707472901.980:1412): pid=5458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 10:01:41.980000 audit[5458]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe44e6ec0 a2=3 a3=1 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:42.035484 systemd[1]: Started session-27.scope. Feb 9 10:01:42.036819 systemd-logind[1374]: New session 27 of user core. Feb 9 10:01:42.056884 kernel: audit: type=1300 audit(1707472901.980:1412): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe44e6ec0 a2=3 a3=1 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:41.980000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:42.067651 kernel: audit: type=1327 audit(1707472901.980:1412): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:42.067818 kernel: audit: type=1105 audit(1707472902.057:1413): pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.057000 audit[5458]: USER_START pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.101199 kernel: audit: type=1103 audit(1707472902.060:1414): pid=5461 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.060000 audit[5461]: CRED_ACQ pid=5461 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.176853 systemd[1]: run-containerd-runc-k8s.io-1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf-runc.AMSrJi.mount: Deactivated successfully. Feb 9 10:01:42.360319 sshd[5458]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:42.360000 audit[5458]: USER_END pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.365013 systemd-logind[1374]: Session 27 logged out. Waiting for processes to exit. Feb 9 10:01:42.366254 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 10:01:42.367440 systemd-logind[1374]: Removed session 27. Feb 9 10:01:42.368132 systemd[1]: sshd@24-10.200.20.33:22-10.200.12.6:49938.service: Deactivated successfully. Feb 9 10:01:42.362000 audit[5458]: CRED_DISP pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.422859 kernel: audit: type=1106 audit(1707472902.360:1415): pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.423009 kernel: audit: type=1104 audit(1707472902.362:1416): pid=5458 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:42.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.12.6:49938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013f23e0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:44.809000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:44.809000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013f2420 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:44.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:44.811000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:44.811000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:01:44.811000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028d24c0 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:44.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:44.811000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013f2560 a2=fc6 a3=0 items=0 ppid=2199 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:01:44.811000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:01:47.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.12.6:51082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:47.433629 systemd[1]: Started sshd@25-10.200.20.33:22-10.200.12.6:51082.service. Feb 9 10:01:47.440111 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 10:01:47.440247 kernel: audit: type=1130 audit(1707472907.432:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.12.6:51082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:47.853000 audit[5532]: USER_ACCT pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:47.855245 sshd[5532]: Accepted publickey for core from 10.200.12.6 port 51082 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:47.886136 kernel: audit: type=1101 audit(1707472907.853:1423): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:47.886248 kernel: audit: type=1103 audit(1707472907.884:1424): pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:47.884000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:47.886782 sshd[5532]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:47.892348 systemd[1]: Started session-28.scope. Feb 9 10:01:47.893149 systemd-logind[1374]: New session 28 of user core. Feb 9 10:01:47.931844 kernel: audit: type=1006 audit(1707472907.884:1425): pid=5532 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 10:01:47.884000 audit[5532]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3c7f450 a2=3 a3=1 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:47.961789 kernel: audit: type=1300 audit(1707472907.884:1425): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3c7f450 a2=3 a3=1 items=0 ppid=1 pid=5532 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:47.962277 kernel: audit: type=1327 audit(1707472907.884:1425): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:47.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:47.914000 audit[5532]: USER_START pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.003837 kernel: audit: type=1105 audit(1707472907.914:1426): pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.004006 kernel: audit: type=1103 audit(1707472907.915:1427): pid=5536 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:47.915000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.272962 sshd[5532]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:48.273000 audit[5532]: USER_END pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.276379 systemd-logind[1374]: Session 28 logged out. Waiting for processes to exit. Feb 9 10:01:48.277792 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 10:01:48.279359 systemd-logind[1374]: Removed session 28. Feb 9 10:01:48.280264 systemd[1]: sshd@25-10.200.20.33:22-10.200.12.6:51082.service: Deactivated successfully. Feb 9 10:01:48.273000 audit[5532]: CRED_DISP pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.335528 kernel: audit: type=1106 audit(1707472908.273:1428): pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.335687 kernel: audit: type=1104 audit(1707472908.273:1429): pid=5532 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:48.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.12.6:51082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:53.343119 systemd[1]: Started sshd@26-10.200.20.33:22-10.200.12.6:51090.service. Feb 9 10:01:53.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.33:22-10.200.12.6:51090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:53.351064 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:53.351276 kernel: audit: type=1130 audit(1707472913.343:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.33:22-10.200.12.6:51090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:53.759000 audit[5547]: USER_ACCT pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.759470 sshd[5547]: Accepted publickey for core from 10.200.12.6 port 51090 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:53.761454 sshd[5547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:53.766741 systemd[1]: Started session-29.scope. Feb 9 10:01:53.768136 systemd-logind[1374]: New session 29 of user core. Feb 9 10:01:53.760000 audit[5547]: CRED_ACQ pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.817008 kernel: audit: type=1101 audit(1707472913.759:1432): pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.817293 kernel: audit: type=1103 audit(1707472913.760:1433): pid=5547 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.834675 kernel: audit: type=1006 audit(1707472913.761:1434): pid=5547 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 10:01:53.761000 audit[5547]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2c91a10 a2=3 a3=1 items=0 ppid=1 pid=5547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:53.863868 kernel: audit: type=1300 audit(1707472913.761:1434): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2c91a10 a2=3 a3=1 items=0 ppid=1 pid=5547 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:53.873654 kernel: audit: type=1327 audit(1707472913.761:1434): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:53.873783 kernel: audit: type=1105 audit(1707472913.773:1435): pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:53.773000 audit[5547]: USER_START pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.774000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:53.931111 kernel: audit: type=1103 audit(1707472913.774:1436): pid=5549 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:54.145450 sshd[5547]: pam_unix(sshd:session): session closed for user core Feb 9 10:01:54.146000 audit[5547]: USER_END pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:54.149195 systemd-logind[1374]: Session 29 logged out. Waiting for processes to exit. Feb 9 10:01:54.150588 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 10:01:54.151839 systemd-logind[1374]: Removed session 29. Feb 9 10:01:54.152750 systemd[1]: sshd@26-10.200.20.33:22-10.200.12.6:51090.service: Deactivated successfully. Feb 9 10:01:54.147000 audit[5547]: CRED_DISP pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:54.204436 kernel: audit: type=1106 audit(1707472914.146:1437): pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:54.204574 kernel: audit: type=1104 audit(1707472914.147:1438): pid=5547 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:54.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.33:22-10.200.12.6:51090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:56.857042 systemd[1]: run-containerd-runc-k8s.io-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e-runc.1GtVua.mount: Deactivated successfully. Feb 9 10:01:59.216152 systemd[1]: Started sshd@27-10.200.20.33:22-10.200.12.6:43996.service. Feb 9 10:01:59.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.20.33:22-10.200.12.6:43996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:59.227092 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:01:59.227215 kernel: audit: type=1130 audit(1707472919.216:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.20.33:22-10.200.12.6:43996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:01:59.632000 audit[5580]: USER_ACCT pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.633348 sshd[5580]: Accepted publickey for core from 10.200.12.6 port 43996 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 10:01:59.664108 kernel: audit: type=1101 audit(1707472919.632:1441): pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.664000 audit[5580]: CRED_ACQ pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.664905 sshd[5580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:01:59.670423 systemd[1]: Started session-30.scope. Feb 9 10:01:59.671751 systemd-logind[1374]: New session 30 of user core. Feb 9 10:01:59.708810 kernel: audit: type=1103 audit(1707472919.664:1442): pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.708971 kernel: audit: type=1006 audit(1707472919.664:1443): pid=5580 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 10:01:59.709015 kernel: audit: type=1300 audit(1707472919.664:1443): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc5e83b0 a2=3 a3=1 items=0 ppid=1 pid=5580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:59.664000 audit[5580]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc5e83b0 a2=3 a3=1 items=0 ppid=1 pid=5580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:59.664000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:59.748401 kernel: audit: type=1327 audit(1707472919.664:1443): proctitle=737368643A20636F7265205B707269765D Feb 9 10:01:59.748574 kernel: audit: type=1105 audit(1707472919.677:1444): pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.677000 audit[5580]: USER_START pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.789507 kernel: audit: type=1103 audit(1707472919.679:1445): pid=5582 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:01:59.679000 audit[5582]: CRED_ACQ pid=5582 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:02:00.042255 sshd[5580]: pam_unix(sshd:session): session closed for user core Feb 9 10:02:00.043000 audit[5580]: USER_END pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:02:00.045708 systemd-logind[1374]: Session 30 logged out. Waiting for processes to exit. Feb 9 10:02:00.047208 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 10:02:00.048897 systemd-logind[1374]: Removed session 30. Feb 9 10:02:00.049720 systemd[1]: sshd@27-10.200.20.33:22-10.200.12.6:43996.service: Deactivated successfully. Feb 9 10:02:00.043000 audit[5580]: CRED_DISP pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:02:00.102655 kernel: audit: type=1106 audit(1707472920.043:1446): pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:02:00.102826 kernel: audit: type=1104 audit(1707472920.043:1447): pid=5580 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:02:00.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.200.20.33:22-10.200.12.6:43996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:02:12.172387 systemd[1]: run-containerd-runc-k8s.io-1f87203ee5eda5e5cfe18c7c8f922277d920b10100c70d765b9b831d30fd6bcf-runc.G9IzFP.mount: Deactivated successfully. Feb 9 10:02:13.857170 systemd[1]: cri-containerd-dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61.scope: Deactivated successfully. Feb 9 10:02:13.857499 systemd[1]: cri-containerd-dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61.scope: Consumed 4.412s CPU time. Feb 9 10:02:13.859000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:02:13.868114 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 10:02:13.868222 kernel: audit: type=1334 audit(1707472933.859:1449): prog-id=88 op=UNLOAD Feb 9 10:02:13.859000 audit: BPF prog-id=89 op=UNLOAD Feb 9 10:02:13.881453 kernel: audit: type=1334 audit(1707472933.859:1450): prog-id=89 op=UNLOAD Feb 9 10:02:13.896198 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61-rootfs.mount: Deactivated successfully. Feb 9 10:02:13.897003 env[1396]: time="2024-02-09T10:02:13.896354069Z" level=info msg="shim disconnected" id=dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61 Feb 9 10:02:13.897003 env[1396]: time="2024-02-09T10:02:13.896404229Z" level=warning msg="cleaning up after shim disconnected" id=dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61 namespace=k8s.io Feb 9 10:02:13.897003 env[1396]: time="2024-02-09T10:02:13.896415749Z" level=info msg="cleaning up dead shim" Feb 9 10:02:13.905874 env[1396]: time="2024-02-09T10:02:13.905815230Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:02:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5667 runtime=io.containerd.runc.v2\n" Feb 9 10:02:14.278535 kubelet[2492]: E0209 10:02:14.278490 2492 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.33:54024->10.200.20.23:2379: read: connection timed out" Feb 9 10:02:14.287286 systemd[1]: cri-containerd-f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779.scope: Deactivated successfully. Feb 9 10:02:14.287592 systemd[1]: cri-containerd-f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779.scope: Consumed 2.404s CPU time. Feb 9 10:02:14.290000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:02:14.290000 audit: BPF prog-id=103 op=UNLOAD Feb 9 10:02:14.307159 kernel: audit: type=1334 audit(1707472934.290:1451): prog-id=84 op=UNLOAD Feb 9 10:02:14.307303 kernel: audit: type=1334 audit(1707472934.290:1452): prog-id=103 op=UNLOAD Feb 9 10:02:14.326603 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779-rootfs.mount: Deactivated successfully. Feb 9 10:02:14.327576 env[1396]: time="2024-02-09T10:02:14.327537368Z" level=info msg="shim disconnected" id=f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779 Feb 9 10:02:14.327730 env[1396]: time="2024-02-09T10:02:14.327714049Z" level=warning msg="cleaning up after shim disconnected" id=f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779 namespace=k8s.io Feb 9 10:02:14.327854 env[1396]: time="2024-02-09T10:02:14.327839409Z" level=info msg="cleaning up dead shim" Feb 9 10:02:14.336116 env[1396]: time="2024-02-09T10:02:14.336051365Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:02:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5692 runtime=io.containerd.runc.v2\n" Feb 9 10:02:14.868942 kubelet[2492]: I0209 10:02:14.868908 2492 scope.go:115] "RemoveContainer" containerID="dfe70f6479be6c4173a4e16584048f0d7bc77d8794482df97a02e5a7edeacc61" Feb 9 10:02:14.871485 kubelet[2492]: I0209 10:02:14.871166 2492 scope.go:115] "RemoveContainer" containerID="f15e500c20fcacd0916d46b3631244b5d422dd76fdc5d2219c6811d4041d5779" Feb 9 10:02:14.872007 env[1396]: time="2024-02-09T10:02:14.871972783Z" level=info msg="CreateContainer within sandbox \"42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 10:02:14.874236 env[1396]: time="2024-02-09T10:02:14.874197233Z" level=info msg="CreateContainer within sandbox \"92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 10:02:14.946581 env[1396]: time="2024-02-09T10:02:14.946526623Z" level=info msg="CreateContainer within sandbox \"42d85f1d324d18c6969f26f8ba43e9761d204387f53e4d67562883296a97d052\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"a2926dee46ded8ea98a14cefcd53b98554c377ce27e46c5e7376c51894d71c60\"" Feb 9 10:02:14.947466 env[1396]: time="2024-02-09T10:02:14.947440387Z" level=info msg="StartContainer for \"a2926dee46ded8ea98a14cefcd53b98554c377ce27e46c5e7376c51894d71c60\"" Feb 9 10:02:14.962237 env[1396]: time="2024-02-09T10:02:14.962182650Z" level=info msg="CreateContainer within sandbox \"92505853d95f4adceb70fc32cab9057f6f272c38d46ae34df7cb1dce14e15b69\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"d56066b358c1bd007a18f42b9af341fd07306ce65000b8c2e332ffab74271479\"" Feb 9 10:02:14.963055 env[1396]: time="2024-02-09T10:02:14.963008214Z" level=info msg="StartContainer for \"d56066b358c1bd007a18f42b9af341fd07306ce65000b8c2e332ffab74271479\"" Feb 9 10:02:14.966645 systemd[1]: Started cri-containerd-a2926dee46ded8ea98a14cefcd53b98554c377ce27e46c5e7376c51894d71c60.scope. Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.008102 kernel: audit: type=1400 audit(1707472934.985:1453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.029735 systemd[1]: Started cri-containerd-d56066b358c1bd007a18f42b9af341fd07306ce65000b8c2e332ffab74271479.scope. Feb 9 10:02:15.055877 kernel: audit: type=1400 audit(1707472934.985:1454): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.056004 kernel: audit: type=1400 audit(1707472934.985:1455): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.087276 kernel: audit: type=1400 audit(1707472934.985:1456): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.108668 kernel: audit: type=1400 audit(1707472934.985:1457): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.132930 kernel: audit: type=1400 audit(1707472934.985:1458): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:14.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit: BPF prog-id=199 op=LOAD Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2199 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393236646565343664656438656139386131346365666364353362 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2199 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393236646565343664656438656139386131346365666364353362 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit: BPF prog-id=200 op=LOAD Feb 9 10:02:15.005000 audit[5715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2199 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393236646565343664656438656139386131346365666364353362 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.005000 audit: BPF prog-id=201 op=LOAD Feb 9 10:02:15.005000 audit[5715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2199 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393236646565343664656438656139386131346365666364353362 Feb 9 10:02:15.006000 audit: BPF prog-id=201 op=UNLOAD Feb 9 10:02:15.006000 audit: BPF prog-id=200 op=UNLOAD Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { perfmon } for pid=5715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit[5715]: AVC avc: denied { bpf } for pid=5715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.006000 audit: BPF prog-id=202 op=LOAD Feb 9 10:02:15.006000 audit[5715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2199 pid=5715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393236646565343664656438656139386131346365666364353362 Feb 9 10:02:15.142877 env[1396]: time="2024-02-09T10:02:15.142831212Z" level=info msg="StartContainer for \"a2926dee46ded8ea98a14cefcd53b98554c377ce27e46c5e7376c51894d71c60\" returns successfully" Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.145000 audit: BPF prog-id=203 op=LOAD Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2180 pid=5737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363036366233353863316264303037613138663432623961663334 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2180 pid=5737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363036366233353863316264303037613138663432623961663334 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit: BPF prog-id=204 op=LOAD Feb 9 10:02:15.146000 audit[5737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2180 pid=5737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363036366233353863316264303037613138663432623961663334 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit: BPF prog-id=205 op=LOAD Feb 9 10:02:15.146000 audit[5737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2180 pid=5737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363036366233353863316264303037613138663432623961663334 Feb 9 10:02:15.146000 audit: BPF prog-id=205 op=UNLOAD Feb 9 10:02:15.146000 audit: BPF prog-id=204 op=UNLOAD Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { perfmon } for pid=5737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit[5737]: AVC avc: denied { bpf } for pid=5737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:15.146000 audit: BPF prog-id=206 op=LOAD Feb 9 10:02:15.146000 audit[5737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2180 pid=5737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:15.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435363036366233353863316264303037613138663432623961663334 Feb 9 10:02:15.171362 systemd[1]: cri-containerd-7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67.scope: Deactivated successfully. Feb 9 10:02:15.170000 audit: BPF prog-id=121 op=UNLOAD Feb 9 10:02:15.171723 systemd[1]: cri-containerd-7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67.scope: Consumed 6.788s CPU time. Feb 9 10:02:15.174000 audit: BPF prog-id=124 op=UNLOAD Feb 9 10:02:15.200400 env[1396]: time="2024-02-09T10:02:15.200355893Z" level=info msg="StartContainer for \"d56066b358c1bd007a18f42b9af341fd07306ce65000b8c2e332ffab74271479\" returns successfully" Feb 9 10:02:15.203979 env[1396]: time="2024-02-09T10:02:15.203930788Z" level=info msg="shim disconnected" id=7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67 Feb 9 10:02:15.204256 env[1396]: time="2024-02-09T10:02:15.204226070Z" level=warning msg="cleaning up after shim disconnected" id=7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67 namespace=k8s.io Feb 9 10:02:15.204345 env[1396]: time="2024-02-09T10:02:15.204330150Z" level=info msg="cleaning up dead shim" Feb 9 10:02:15.215475 env[1396]: time="2024-02-09T10:02:15.215427317Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:02:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5788 runtime=io.containerd.runc.v2\n" Feb 9 10:02:15.878702 kubelet[2492]: I0209 10:02:15.878664 2492 scope.go:115] "RemoveContainer" containerID="7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67" Feb 9 10:02:15.880912 env[1396]: time="2024-02-09T10:02:15.880870109Z" level=info msg="CreateContainer within sandbox \"7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 10:02:15.923185 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67-rootfs.mount: Deactivated successfully. Feb 9 10:02:15.931111 env[1396]: time="2024-02-09T10:02:15.931032880Z" level=info msg="CreateContainer within sandbox \"7c33de434dfa1cd1e37e94d05f3075972dc588b2e1cbcf7201aee0032003f110\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1\"" Feb 9 10:02:15.931883 env[1396]: time="2024-02-09T10:02:15.931851363Z" level=info msg="StartContainer for \"4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1\"" Feb 9 10:02:15.964332 systemd[1]: Started cri-containerd-4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1.scope. Feb 9 10:02:15.980435 systemd[1]: run-containerd-runc-k8s.io-4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1-runc.7KMbyJ.mount: Deactivated successfully. Feb 9 10:02:16.135923 kubelet[2492]: E0209 10:02:16.135732 2492 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-ee2552a568.17b229944f83d789", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-ee2552a568", UID:"6cae8c9d10e7bbb3f1f28fef44a2a6d6", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Liveness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-ee2552a568"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 2, 5, 692778377, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 2, 5, 692778377, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.33:53840->10.200.20.23:2379: read: connection timed out' (will not retry!) Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit: BPF prog-id=207 op=LOAD Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2572 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373465656266353235366565363136636233626237613136383238 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2572 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373465656266353235366565363136636233626237613136383238 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit: BPF prog-id=208 op=LOAD Feb 9 10:02:16.226000 audit[5814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2572 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373465656266353235366565363136636233626237613136383238 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.226000 audit: BPF prog-id=209 op=LOAD Feb 9 10:02:16.226000 audit[5814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2572 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:16.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373465656266353235366565363136636233626237613136383238 Feb 9 10:02:16.226000 audit: BPF prog-id=209 op=UNLOAD Feb 9 10:02:16.226000 audit: BPF prog-id=208 op=UNLOAD Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { perfmon } for pid=5814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit[5814]: AVC avc: denied { bpf } for pid=5814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:02:16.227000 audit: BPF prog-id=210 op=LOAD Feb 9 10:02:16.227000 audit[5814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2572 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:02:16.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373465656266353235366565363136636233626237613136383238 Feb 9 10:02:16.257298 env[1396]: time="2024-02-09T10:02:16.257220626Z" level=info msg="StartContainer for \"4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1\" returns successfully" Feb 9 10:02:17.748000 audit[5733]: AVC avc: denied { watch } for pid=5733 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:17.748000 audit[5733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400063a6c0 a2=fc6 a3=0 items=0 ppid=2199 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:02:17.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:17.748000 audit[5733]: AVC avc: denied { watch } for pid=5733 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:17.748000 audit[5733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400020f380 a2=fc6 a3=0 items=0 ppid=2199 pid=5733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c462,c1023 key=(null) Feb 9 10:02:17.748000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 10:02:24.280417 kubelet[2492]: E0209 10:02:24.280180 2492 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:02:24.518379 kubelet[2492]: I0209 10:02:24.518343 2492 status_manager.go:809] "Failed to get status for pod" podUID=6cae8c9d10e7bbb3f1f28fef44a2a6d6 pod="kube-system/kube-apiserver-ci-3510.3.2-a-ee2552a568" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.33:53938->10.200.20.23:2379: read: connection timed out" Feb 9 10:02:25.268000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.274978 kernel: kauditd_printk_skb: 173 callbacks suppressed Feb 9 10:02:25.275136 kernel: audit: type=1400 audit(1707472945.268:1511): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.268000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4009f98920 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.336197 kernel: audit: type=1300 audit(1707472945.268:1511): arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4009f98920 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.299000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.394591 kernel: audit: type=1327 audit(1707472945.268:1511): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.394694 kernel: audit: type=1400 audit(1707472945.299:1512): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.299000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.421134 kernel: audit: type=1400 audit(1707472945.299:1513): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.299000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400a09c1e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.454485 kernel: audit: type=1300 audit(1707472945.299:1512): arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400a09c1e0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.454628 kernel: audit: type=1300 audit(1707472945.299:1513): arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012d00a20 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.299000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=61 a1=4012d00a20 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.299000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.515963 kernel: audit: type=1327 audit(1707472945.299:1513): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.516143 kernel: audit: type=1327 audit(1707472945.299:1512): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.299000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.525000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.571912 kernel: audit: type=1400 audit(1707472945.525:1514): avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4012d00e40 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.525000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521009 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.525000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400a09c5a0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.525000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:25.544000 audit[2318]: AVC avc: denied { watch } for pid=2318 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 10:02:25.544000 audit[2318]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4009f98ae0 a2=fc6 a3=0 items=0 ppid=2219 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c192,c1023 key=(null) Feb 9 10:02:25.544000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 10:02:26.854862 systemd[1]: run-containerd-runc-k8s.io-713c8c22b9f0575f6f6d1b78a0f21c9b1ff26cf19dcb1c8e848bcd768cf9a02e-runc.EM0rCr.mount: Deactivated successfully. Feb 9 10:02:27.785016 systemd[1]: cri-containerd-4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1.scope: Deactivated successfully. Feb 9 10:02:27.784000 audit: BPF prog-id=207 op=UNLOAD Feb 9 10:02:27.788000 audit: BPF prog-id=210 op=UNLOAD Feb 9 10:02:27.801648 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1-rootfs.mount: Deactivated successfully. Feb 9 10:02:27.880219 env[1396]: time="2024-02-09T10:02:27.880163551Z" level=info msg="shim disconnected" id=4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1 Feb 9 10:02:27.880644 env[1396]: time="2024-02-09T10:02:27.880623513Z" level=warning msg="cleaning up after shim disconnected" id=4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1 namespace=k8s.io Feb 9 10:02:27.880726 env[1396]: time="2024-02-09T10:02:27.880712473Z" level=info msg="cleaning up dead shim" Feb 9 10:02:27.888256 env[1396]: time="2024-02-09T10:02:27.888215697Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:02:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5878 runtime=io.containerd.runc.v2\n" Feb 9 10:02:27.906484 kubelet[2492]: I0209 10:02:27.905732 2492 scope.go:115] "RemoveContainer" containerID="7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67" Feb 9 10:02:27.906484 kubelet[2492]: I0209 10:02:27.906151 2492 scope.go:115] "RemoveContainer" containerID="4d74eebf5256ee616cb3bb7a168282ee927b4156f11a85b0a61017e660c622f1" Feb 9 10:02:27.906484 kubelet[2492]: E0209 10:02:27.906415 2492 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-7ff8dc855-79grx_tigera-operator(e4c7b6e0-a38f-4313-95fc-06d91d17fd89)\"" pod="tigera-operator/tigera-operator-7ff8dc855-79grx" podUID=e4c7b6e0-a38f-4313-95fc-06d91d17fd89 Feb 9 10:02:27.908100 env[1396]: time="2024-02-09T10:02:27.908042920Z" level=info msg="RemoveContainer for \"7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67\"" Feb 9 10:02:27.919164 env[1396]: time="2024-02-09T10:02:27.919126636Z" level=info msg="RemoveContainer for \"7edf269cb8c9a57ae91b0c63e559c3fb1fe3e2220fdb15f2be7ef03c06f91c67\" returns successfully" Feb 9 10:02:33.694000 audit[4944]: AVC avc: denied { watch } for pid=4944 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.3339639244/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c141,c581 tclass=file permissive=0 Feb 9 10:02:33.700974 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 10:02:33.701133 kernel: audit: type=1400 audit(1707472953.694:1519): avc: denied { watch } for pid=4944 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.3339639244/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c141,c581 tclass=file permissive=0 Feb 9 10:02:33.694000 audit[4944]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400198a620 a2=fc6 a3=0 items=0 ppid=4577 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 key=(null) Feb 9 10:02:33.761307 kernel: audit: type=1300 audit(1707472953.694:1519): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400198a620 a2=fc6 a3=0 items=0 ppid=4577 pid=4944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c141,c581 key=(null) Feb 9 10:02:33.761427 kernel: audit: type=1327 audit(1707472953.694:1519): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:33.694000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:34.281222 kubelet[2492]: E0209 10:02:34.281190 2492 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-ee2552a568?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:02:35.909000 audit[4999]: AVC avc: denied { watch } for pid=4999 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.2178367230/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c905,c925 tclass=file permissive=0 Feb 9 10:02:35.909000 audit[4999]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d3c100 a2=fc6 a3=0 items=0 ppid=4617 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 key=(null) Feb 9 10:02:35.971282 kernel: audit: type=1400 audit(1707472955.909:1520): avc: denied { watch } for pid=4999 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_10_00_12.2178367230/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c905,c925 tclass=file permissive=0 Feb 9 10:02:35.971431 kernel: audit: type=1300 audit(1707472955.909:1520): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001d3c100 a2=fc6 a3=0 items=0 ppid=4617 pid=4999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c905,c925 key=(null) Feb 9 10:02:35.909000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:36.000379 kernel: audit: type=1327 audit(1707472955.909:1520): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 10:02:37.588660 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.605768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.622714 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.639907 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.656790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.674061 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.674341 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.694659 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.694958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.715329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.715590 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.735247 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.735511 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.755348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.755608 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.774900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.775231 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.794169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.794396 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.813593 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.813919 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.832894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.833262 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.852112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.852367 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.871519 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.871967 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.890943 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.891240 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.910275 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.910518 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.929402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.929676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.958064 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.958432 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.958576 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.977552 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:37.977827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.005849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.006139 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.006250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.027528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.078044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.099942 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100060 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100192 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100296 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100486 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.100625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.116108 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.121267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.134603 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.134874 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.144155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.162646 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.163005 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.191346 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.191601 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.191721 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.210166 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.210482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.228553 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.228791 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.247283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.247544 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.266377 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.266617 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.285725 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.285971 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.304680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.304911 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.323343 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.323658 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.341889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.342188 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.360792 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.361010 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.379585 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.379782 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.397848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.398091 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.407144 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.426138 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.426412 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.445363 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.445616 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.463774 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.463997 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.482313 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.482561 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.500762 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.516354 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.516481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.537701 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.537950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.538060 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.555969 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.556241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.574644 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.593524 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.603510 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.603639 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.603748 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.622049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.622300 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.640070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.676205 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.676388 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.676617 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.676739 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.676848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.695140 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:38.695467 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001