Feb 9 18:56:02.048612 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:56:02.048630 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:56:02.048638 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 18:56:02.048645 kernel: printk: bootconsole [pl11] enabled Feb 9 18:56:02.048650 kernel: efi: EFI v2.70 by EDK II Feb 9 18:56:02.048655 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 18:56:02.048662 kernel: random: crng init done Feb 9 18:56:02.048667 kernel: ACPI: Early table checksum verification disabled Feb 9 18:56:02.048672 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 18:56:02.048678 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048683 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048690 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 18:56:02.048695 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048700 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048707 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048713 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048719 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048726 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048731 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 18:56:02.048737 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:56:02.048743 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 18:56:02.048748 kernel: NUMA: Failed to initialise from firmware Feb 9 18:56:02.048754 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:56:02.048760 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 18:56:02.048765 kernel: Zone ranges: Feb 9 18:56:02.048771 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 18:56:02.048777 kernel: DMA32 empty Feb 9 18:56:02.048784 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:56:02.048789 kernel: Movable zone start for each node Feb 9 18:56:02.048795 kernel: Early memory node ranges Feb 9 18:56:02.048800 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 18:56:02.048806 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 18:56:02.048812 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 18:56:02.048817 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 18:56:02.048823 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 18:56:02.048828 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 18:56:02.048834 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 18:56:02.048839 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 18:56:02.048845 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:56:02.048852 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:56:02.048860 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 18:56:02.048866 kernel: psci: probing for conduit method from ACPI. Feb 9 18:56:02.048872 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:56:02.048878 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:56:02.048885 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 18:56:02.048891 kernel: psci: SMC Calling Convention v1.4 Feb 9 18:56:02.048897 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 18:56:02.048903 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 18:56:02.048909 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:56:02.048915 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:56:02.048921 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 18:56:02.048927 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:56:02.048933 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:56:02.048939 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:56:02.048945 kernel: CPU features: detected: Spectre-BHB Feb 9 18:56:02.048951 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:56:02.048958 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:56:02.048964 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:56:02.048970 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 18:56:02.048976 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 18:56:02.048982 kernel: Policy zone: Normal Feb 9 18:56:02.048990 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:56:02.048996 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:56:02.049003 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:56:02.049009 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:56:02.049015 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:56:02.049022 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 18:56:02.049028 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 18:56:02.049034 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:56:02.049040 kernel: trace event string verifier disabled Feb 9 18:56:02.049046 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:56:02.049053 kernel: rcu: RCU event tracing is enabled. Feb 9 18:56:02.049059 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:56:02.049065 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:56:02.049071 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:56:02.049077 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:56:02.049083 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:56:02.049090 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:56:02.049096 kernel: GICv3: 960 SPIs implemented Feb 9 18:56:02.049102 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:56:02.049107 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:56:02.049113 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:56:02.049119 kernel: GICv3: 16 PPIs implemented Feb 9 18:56:02.049125 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 18:56:02.049131 kernel: ITS: No ITS available, not enabling LPIs Feb 9 18:56:02.049138 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:56:02.049144 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:56:02.049150 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:56:02.049196 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:56:02.049208 kernel: Console: colour dummy device 80x25 Feb 9 18:56:02.049215 kernel: printk: console [tty1] enabled Feb 9 18:56:02.049221 kernel: ACPI: Core revision 20210730 Feb 9 18:56:02.049228 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:56:02.049234 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:56:02.049240 kernel: LSM: Security Framework initializing Feb 9 18:56:02.049246 kernel: SELinux: Initializing. Feb 9 18:56:02.049252 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:56:02.049259 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:56:02.049266 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 18:56:02.049272 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 18:56:02.049279 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:56:02.049285 kernel: Remapping and enabling EFI services. Feb 9 18:56:02.049291 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:56:02.049298 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:56:02.049304 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 18:56:02.049311 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:56:02.049318 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:56:02.049325 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:56:02.049331 kernel: SMP: Total of 2 processors activated. Feb 9 18:56:02.049338 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:56:02.049344 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 18:56:02.049351 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:56:02.049357 kernel: CPU features: detected: CRC32 instructions Feb 9 18:56:02.049363 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:56:02.049369 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:56:02.049375 kernel: CPU features: detected: Privileged Access Never Feb 9 18:56:02.049383 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:56:02.049389 kernel: alternatives: patching kernel code Feb 9 18:56:02.049400 kernel: devtmpfs: initialized Feb 9 18:56:02.049407 kernel: KASLR enabled Feb 9 18:56:02.049414 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:56:02.049421 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:56:02.049427 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:56:02.049433 kernel: SMBIOS 3.1.0 present. Feb 9 18:56:02.049440 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 18:56:02.049447 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:56:02.049455 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:56:02.049461 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:56:02.049468 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:56:02.049474 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:56:02.049481 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Feb 9 18:56:02.049488 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:56:02.049494 kernel: cpuidle: using governor menu Feb 9 18:56:02.049502 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:56:02.049509 kernel: ASID allocator initialised with 32768 entries Feb 9 18:56:02.049515 kernel: ACPI: bus type PCI registered Feb 9 18:56:02.049522 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:56:02.049528 kernel: Serial: AMBA PL011 UART driver Feb 9 18:56:02.049535 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:56:02.049542 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:56:02.049549 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:56:02.049555 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:56:02.049563 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:56:02.049570 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:56:02.049576 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:56:02.049583 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:56:02.049590 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:56:02.049596 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:56:02.049603 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:56:02.049609 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:56:02.049616 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:56:02.049623 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:56:02.049630 kernel: ACPI: Interpreter enabled Feb 9 18:56:02.049637 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:56:02.049643 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:56:02.049650 kernel: printk: console [ttyAMA0] enabled Feb 9 18:56:02.049656 kernel: printk: bootconsole [pl11] disabled Feb 9 18:56:02.049663 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 18:56:02.049670 kernel: iommu: Default domain type: Translated Feb 9 18:56:02.049677 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:56:02.049684 kernel: vgaarb: loaded Feb 9 18:56:02.049691 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:56:02.049697 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:56:02.049704 kernel: PTP clock support registered Feb 9 18:56:02.049710 kernel: Registered efivars operations Feb 9 18:56:02.049717 kernel: No ACPI PMU IRQ for CPU0 Feb 9 18:56:02.049723 kernel: No ACPI PMU IRQ for CPU1 Feb 9 18:56:02.049730 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:56:02.049736 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:56:02.049744 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:56:02.049751 kernel: pnp: PnP ACPI init Feb 9 18:56:02.049757 kernel: pnp: PnP ACPI: found 0 devices Feb 9 18:56:02.049764 kernel: NET: Registered PF_INET protocol family Feb 9 18:56:02.049770 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:56:02.049777 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:56:02.049784 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:56:02.049790 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:56:02.049797 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:56:02.049805 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:56:02.049812 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:56:02.049819 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:56:02.049825 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:56:02.049832 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:56:02.049838 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 18:56:02.049845 kernel: kvm [1]: HYP mode not available Feb 9 18:56:02.049851 kernel: Initialise system trusted keyrings Feb 9 18:56:02.049857 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:56:02.049865 kernel: Key type asymmetric registered Feb 9 18:56:02.049872 kernel: Asymmetric key parser 'x509' registered Feb 9 18:56:02.049878 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:56:02.049885 kernel: io scheduler mq-deadline registered Feb 9 18:56:02.049891 kernel: io scheduler kyber registered Feb 9 18:56:02.049898 kernel: io scheduler bfq registered Feb 9 18:56:02.049905 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:56:02.049912 kernel: thunder_xcv, ver 1.0 Feb 9 18:56:02.049919 kernel: thunder_bgx, ver 1.0 Feb 9 18:56:02.049927 kernel: nicpf, ver 1.0 Feb 9 18:56:02.049933 kernel: nicvf, ver 1.0 Feb 9 18:56:02.050048 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:56:02.050108 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:56:01 UTC (1707504961) Feb 9 18:56:02.050117 kernel: efifb: probing for efifb Feb 9 18:56:02.050124 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 18:56:02.050131 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 18:56:02.050138 kernel: efifb: scrolling: redraw Feb 9 18:56:02.050146 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 18:56:02.050165 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:56:02.050173 kernel: fb0: EFI VGA frame buffer device Feb 9 18:56:02.050180 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 18:56:02.050186 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:56:02.050193 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:56:02.050199 kernel: Segment Routing with IPv6 Feb 9 18:56:02.050206 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:56:02.050213 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:56:02.050221 kernel: Key type dns_resolver registered Feb 9 18:56:02.050227 kernel: registered taskstats version 1 Feb 9 18:56:02.050234 kernel: Loading compiled-in X.509 certificates Feb 9 18:56:02.050241 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:56:02.050247 kernel: Key type .fscrypt registered Feb 9 18:56:02.050253 kernel: Key type fscrypt-provisioning registered Feb 9 18:56:02.050260 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:56:02.050267 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:56:02.050273 kernel: ima: No architecture policies found Feb 9 18:56:02.050281 kernel: Freeing unused kernel memory: 34688K Feb 9 18:56:02.050288 kernel: Run /init as init process Feb 9 18:56:02.050295 kernel: with arguments: Feb 9 18:56:02.050302 kernel: /init Feb 9 18:56:02.050308 kernel: with environment: Feb 9 18:56:02.050314 kernel: HOME=/ Feb 9 18:56:02.050321 kernel: TERM=linux Feb 9 18:56:02.050327 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:56:02.050336 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:56:02.050346 systemd[1]: Detected virtualization microsoft. Feb 9 18:56:02.050353 systemd[1]: Detected architecture arm64. Feb 9 18:56:02.050360 systemd[1]: Running in initrd. Feb 9 18:56:02.050367 systemd[1]: No hostname configured, using default hostname. Feb 9 18:56:02.050374 systemd[1]: Hostname set to . Feb 9 18:56:02.050381 systemd[1]: Initializing machine ID from random generator. Feb 9 18:56:02.050388 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:56:02.050396 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:56:02.050403 systemd[1]: Reached target cryptsetup.target. Feb 9 18:56:02.050410 systemd[1]: Reached target paths.target. Feb 9 18:56:02.050417 systemd[1]: Reached target slices.target. Feb 9 18:56:02.050424 systemd[1]: Reached target swap.target. Feb 9 18:56:02.050431 systemd[1]: Reached target timers.target. Feb 9 18:56:02.050438 systemd[1]: Listening on iscsid.socket. Feb 9 18:56:02.050445 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:56:02.050454 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:56:02.050461 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:56:02.050468 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:56:02.050476 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:56:02.050483 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:56:02.050490 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:56:02.050497 systemd[1]: Reached target sockets.target. Feb 9 18:56:02.050504 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:56:02.050511 systemd[1]: Finished network-cleanup.service. Feb 9 18:56:02.050520 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:56:02.050527 systemd[1]: Starting systemd-journald.service... Feb 9 18:56:02.050534 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:56:02.050540 systemd[1]: Starting systemd-resolved.service... Feb 9 18:56:02.050547 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:56:02.050559 systemd-journald[276]: Journal started Feb 9 18:56:02.050598 systemd-journald[276]: Runtime Journal (/run/log/journal/8fb82cb5f1814fd8a1833fe088d30879) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:56:02.033770 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 18:56:02.079307 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:56:02.088987 systemd[1]: Started systemd-journald.service. Feb 9 18:56:02.093642 systemd-resolved[278]: Positive Trust Anchors: Feb 9 18:56:02.117970 kernel: Bridge firewalling registered Feb 9 18:56:02.117992 kernel: audit: type=1130 audit(1707504962.096:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.093653 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:56:02.133759 kernel: SCSI subsystem initialized Feb 9 18:56:02.093680 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:56:02.188587 kernel: audit: type=1130 audit(1707504962.170:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.094394 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 18:56:02.225313 kernel: audit: type=1130 audit(1707504962.193:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.225334 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:56:02.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.095741 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 18:56:02.267369 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:56:02.267392 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:56:02.267402 kernel: audit: type=1130 audit(1707504962.240:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.267412 kernel: audit: type=1130 audit(1707504962.262:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.117650 systemd[1]: Started systemd-resolved.service. Feb 9 18:56:02.312319 kernel: audit: type=1130 audit(1707504962.290:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.171303 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:56:02.193975 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:56:02.257215 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 18:56:02.257224 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:56:02.262676 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:56:02.393384 kernel: audit: type=1130 audit(1707504962.365:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.290594 systemd[1]: Reached target nss-lookup.target. Feb 9 18:56:02.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.321666 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:56:02.327368 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:56:02.454358 kernel: audit: type=1130 audit(1707504962.393:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.454383 kernel: audit: type=1130 audit(1707504962.421:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.332212 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:56:02.460653 dracut-cmdline[299]: dracut-dracut-053 Feb 9 18:56:02.351591 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:56:02.386178 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:56:02.393628 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:56:02.480752 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:56:02.426865 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:56:02.566182 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:56:02.577168 kernel: iscsi: registered transport (tcp) Feb 9 18:56:02.596712 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:56:02.596798 kernel: QLogic iSCSI HBA Driver Feb 9 18:56:02.625707 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:56:02.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:02.631539 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:56:02.685176 kernel: raid6: neonx8 gen() 13766 MB/s Feb 9 18:56:02.706166 kernel: raid6: neonx8 xor() 10835 MB/s Feb 9 18:56:02.726168 kernel: raid6: neonx4 gen() 13543 MB/s Feb 9 18:56:02.747164 kernel: raid6: neonx4 xor() 11240 MB/s Feb 9 18:56:02.767164 kernel: raid6: neonx2 gen() 13048 MB/s Feb 9 18:56:02.787163 kernel: raid6: neonx2 xor() 10267 MB/s Feb 9 18:56:02.808165 kernel: raid6: neonx1 gen() 10497 MB/s Feb 9 18:56:02.828163 kernel: raid6: neonx1 xor() 8803 MB/s Feb 9 18:56:02.848169 kernel: raid6: int64x8 gen() 6297 MB/s Feb 9 18:56:02.869165 kernel: raid6: int64x8 xor() 3548 MB/s Feb 9 18:56:02.890164 kernel: raid6: int64x4 gen() 7252 MB/s Feb 9 18:56:02.910168 kernel: raid6: int64x4 xor() 3856 MB/s Feb 9 18:56:02.931166 kernel: raid6: int64x2 gen() 6153 MB/s Feb 9 18:56:02.952164 kernel: raid6: int64x2 xor() 3325 MB/s Feb 9 18:56:02.973163 kernel: raid6: int64x1 gen() 5047 MB/s Feb 9 18:56:02.998754 kernel: raid6: int64x1 xor() 2645 MB/s Feb 9 18:56:02.998765 kernel: raid6: using algorithm neonx8 gen() 13766 MB/s Feb 9 18:56:02.998774 kernel: raid6: .... xor() 10835 MB/s, rmw enabled Feb 9 18:56:03.003082 kernel: raid6: using neon recovery algorithm Feb 9 18:56:03.024734 kernel: xor: measuring software checksum speed Feb 9 18:56:03.024746 kernel: 8regs : 17304 MB/sec Feb 9 18:56:03.033615 kernel: 32regs : 20749 MB/sec Feb 9 18:56:03.033625 kernel: arm64_neon : 27826 MB/sec Feb 9 18:56:03.033633 kernel: xor: using function: arm64_neon (27826 MB/sec) Feb 9 18:56:03.094176 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:56:03.103144 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:56:03.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:03.112000 audit: BPF prog-id=7 op=LOAD Feb 9 18:56:03.112000 audit: BPF prog-id=8 op=LOAD Feb 9 18:56:03.112871 systemd[1]: Starting systemd-udevd.service... Feb 9 18:56:03.130668 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 9 18:56:03.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:03.136801 systemd[1]: Started systemd-udevd.service. Feb 9 18:56:03.147129 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:56:03.164150 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 9 18:56:03.195997 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:56:03.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:03.201994 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:56:03.236307 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:56:03.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:03.289184 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 18:56:03.304936 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 18:56:03.305002 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 9 18:56:03.317965 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 18:56:03.318010 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 18:56:03.334179 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 9 18:56:03.341179 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 18:56:03.341224 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 18:56:03.348544 kernel: scsi host0: storvsc_host_t Feb 9 18:56:03.348614 kernel: scsi host1: storvsc_host_t Feb 9 18:56:03.358733 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 18:56:03.367179 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 18:56:03.384791 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 18:56:03.385018 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:56:03.396863 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 18:56:03.397231 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 18:56:03.397428 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 18:56:03.402210 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 18:56:03.409670 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 18:56:03.409815 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 18:56:03.418177 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:56:03.424487 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 18:56:03.448179 kernel: hv_netvsc 002248b6-ba42-0022-48b6-ba42002248b6 eth0: VF slot 1 added Feb 9 18:56:03.465588 kernel: hv_vmbus: registering driver hv_pci Feb 9 18:56:03.465644 kernel: hv_pci 4e4b8249-f6a7-4e3d-8cb2-be976e5f93c3: PCI VMBus probing: Using version 0x10004 Feb 9 18:56:03.482560 kernel: hv_pci 4e4b8249-f6a7-4e3d-8cb2-be976e5f93c3: PCI host bridge to bus f6a7:00 Feb 9 18:56:03.482772 kernel: pci_bus f6a7:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 18:56:03.490143 kernel: pci_bus f6a7:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 18:56:03.497254 kernel: pci f6a7:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 18:56:03.512480 kernel: pci f6a7:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:56:03.535627 kernel: pci f6a7:00:02.0: enabling Extended Tags Feb 9 18:56:03.554223 kernel: pci f6a7:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at f6a7:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 18:56:03.567666 kernel: pci_bus f6a7:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 18:56:03.567806 kernel: pci f6a7:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:56:03.608183 kernel: mlx5_core f6a7:00:02.0: firmware version: 16.30.1284 Feb 9 18:56:03.768186 kernel: mlx5_core f6a7:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 18:56:03.829296 kernel: hv_netvsc 002248b6-ba42-0022-48b6-ba42002248b6 eth0: VF registering: eth1 Feb 9 18:56:03.829493 kernel: mlx5_core f6a7:00:02.0 eth1: joined to eth0 Feb 9 18:56:03.848177 kernel: mlx5_core f6a7:00:02.0 enP63143s1: renamed from eth1 Feb 9 18:56:03.853195 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:56:03.936279 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (532) Feb 9 18:56:03.948421 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:56:04.065330 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:56:04.132328 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:56:04.138630 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:56:04.155240 systemd[1]: Starting disk-uuid.service... Feb 9 18:56:04.180184 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:56:04.199181 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:56:05.197015 disk-uuid[604]: The operation has completed successfully. Feb 9 18:56:05.203032 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:56:05.258067 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:56:05.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.258192 systemd[1]: Finished disk-uuid.service. Feb 9 18:56:05.267829 systemd[1]: Starting verity-setup.service... Feb 9 18:56:05.312177 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:56:05.554477 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:56:05.564790 systemd[1]: Finished verity-setup.service. Feb 9 18:56:05.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.571201 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:56:05.635178 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:56:05.635510 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:56:05.640046 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:56:05.640861 systemd[1]: Starting ignition-setup.service... Feb 9 18:56:05.648835 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:56:05.693360 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:56:05.693419 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:56:05.698332 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:56:05.732213 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:56:05.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.742000 audit: BPF prog-id=9 op=LOAD Feb 9 18:56:05.743017 systemd[1]: Starting systemd-networkd.service... Feb 9 18:56:05.771736 systemd-networkd[868]: lo: Link UP Feb 9 18:56:05.775916 systemd-networkd[868]: lo: Gained carrier Feb 9 18:56:05.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.776745 systemd-networkd[868]: Enumeration completed Feb 9 18:56:05.776866 systemd[1]: Started systemd-networkd.service. Feb 9 18:56:05.781721 systemd[1]: Reached target network.target. Feb 9 18:56:05.785966 systemd-networkd[868]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:56:05.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.792771 systemd[1]: Starting iscsiuio.service... Feb 9 18:56:05.831599 iscsid[876]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:56:05.831599 iscsid[876]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 18:56:05.831599 iscsid[876]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:56:05.831599 iscsid[876]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:56:05.831599 iscsid[876]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:56:05.831599 iscsid[876]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:56:05.831599 iscsid[876]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:56:05.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.805344 systemd[1]: Started iscsiuio.service. Feb 9 18:56:05.815136 systemd[1]: Starting iscsid.service... Feb 9 18:56:05.955134 kernel: mlx5_core f6a7:00:02.0 enP63143s1: Link up Feb 9 18:56:05.837135 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:56:05.837542 systemd[1]: Started iscsid.service. Feb 9 18:56:05.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:05.845757 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:56:05.901579 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:56:05.906618 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:56:05.911832 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:56:06.003720 kernel: hv_netvsc 002248b6-ba42-0022-48b6-ba42002248b6 eth0: Data path switched to VF: enP63143s1 Feb 9 18:56:06.003856 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:56:05.917509 systemd[1]: Reached target remote-fs.target. Feb 9 18:56:05.937508 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:56:05.961045 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:56:06.003087 systemd-networkd[868]: enP63143s1: Link UP Feb 9 18:56:06.003179 systemd-networkd[868]: eth0: Link UP Feb 9 18:56:06.003304 systemd-networkd[868]: eth0: Gained carrier Feb 9 18:56:06.017896 systemd-networkd[868]: enP63143s1: Gained carrier Feb 9 18:56:06.044231 systemd-networkd[868]: eth0: DHCPv4 address 10.200.20.14/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:56:06.156995 systemd[1]: Finished ignition-setup.service. Feb 9 18:56:06.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:06.188903 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 18:56:06.188951 kernel: audit: type=1130 audit(1707504966.161:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:06.189100 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:56:07.836376 systemd-networkd[868]: eth0: Gained IPv6LL Feb 9 18:56:09.122231 ignition[895]: Ignition 2.14.0 Feb 9 18:56:09.122243 ignition[895]: Stage: fetch-offline Feb 9 18:56:09.122300 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:09.122325 ignition[895]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:09.218096 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:09.218255 ignition[895]: parsed url from cmdline: "" Feb 9 18:56:09.218259 ignition[895]: no config URL provided Feb 9 18:56:09.218265 ignition[895]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:56:09.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.225587 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:56:09.268400 kernel: audit: type=1130 audit(1707504969.234:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.218274 ignition[895]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:56:09.236110 systemd[1]: Starting ignition-fetch.service... Feb 9 18:56:09.218279 ignition[895]: failed to fetch config: resource requires networking Feb 9 18:56:09.218384 ignition[895]: Ignition finished successfully Feb 9 18:56:09.253410 ignition[901]: Ignition 2.14.0 Feb 9 18:56:09.253417 ignition[901]: Stage: fetch Feb 9 18:56:09.253531 ignition[901]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:09.253556 ignition[901]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:09.256497 ignition[901]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:09.273875 ignition[901]: parsed url from cmdline: "" Feb 9 18:56:09.273885 ignition[901]: no config URL provided Feb 9 18:56:09.273893 ignition[901]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:56:09.273908 ignition[901]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:56:09.273951 ignition[901]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 18:56:09.369819 ignition[901]: GET result: OK Feb 9 18:56:09.369867 ignition[901]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 18:56:09.440710 ignition[901]: opening config device: "/dev/sr0" Feb 9 18:56:09.441183 ignition[901]: getting drive status for "/dev/sr0" Feb 9 18:56:09.441297 ignition[901]: drive status: OK Feb 9 18:56:09.441347 ignition[901]: mounting config device Feb 9 18:56:09.441367 ignition[901]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure1737253382" Feb 9 18:56:09.467592 ignition[901]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure1737253382" Feb 9 18:56:09.474722 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 18:56:09.468596 ignition[901]: checking for config drive Feb 9 18:56:09.474637 ignition[901]: reading config Feb 9 18:56:09.475094 ignition[901]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure1737253382" Feb 9 18:56:09.482294 ignition[901]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure1737253382" Feb 9 18:56:09.475492 systemd[1]: tmp-ignition\x2dazure1737253382.mount: Deactivated successfully. Feb 9 18:56:09.482311 ignition[901]: config has been read from custom data Feb 9 18:56:09.482444 ignition[901]: parsing config with SHA512: 45a89fbbb7e75372d26cb6b53eaad43e441d83b895705ce56a7b80fc2da5d44054b6102481318a34602f15b3456c987e561951ab51229fb394c74b94d8cb5a7a Feb 9 18:56:09.525028 unknown[901]: fetched base config from "system" Feb 9 18:56:09.525040 unknown[901]: fetched base config from "system" Feb 9 18:56:09.525676 ignition[901]: fetch: fetch complete Feb 9 18:56:09.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.525045 unknown[901]: fetched user config from "azure" Feb 9 18:56:09.563389 kernel: audit: type=1130 audit(1707504969.538:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.525681 ignition[901]: fetch: fetch passed Feb 9 18:56:09.531356 systemd[1]: Finished ignition-fetch.service. Feb 9 18:56:09.525721 ignition[901]: Ignition finished successfully Feb 9 18:56:09.539700 systemd[1]: Starting ignition-kargs.service... Feb 9 18:56:09.571124 ignition[909]: Ignition 2.14.0 Feb 9 18:56:09.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.584736 systemd[1]: Finished ignition-kargs.service. Feb 9 18:56:09.617240 kernel: audit: type=1130 audit(1707504969.588:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.571131 ignition[909]: Stage: kargs Feb 9 18:56:09.609016 systemd[1]: Starting ignition-disks.service... Feb 9 18:56:09.571263 ignition[909]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:09.659837 kernel: audit: type=1130 audit(1707504969.630:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.625459 systemd[1]: Finished ignition-disks.service. Feb 9 18:56:09.571290 ignition[909]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:09.630725 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:56:09.574439 ignition[909]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:09.660064 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:56:09.580435 ignition[909]: kargs: kargs passed Feb 9 18:56:09.669269 systemd[1]: Reached target local-fs.target. Feb 9 18:56:09.580491 ignition[909]: Ignition finished successfully Feb 9 18:56:09.679026 systemd[1]: Reached target sysinit.target. Feb 9 18:56:09.615697 ignition[915]: Ignition 2.14.0 Feb 9 18:56:09.689814 systemd[1]: Reached target basic.target. Feb 9 18:56:09.615704 ignition[915]: Stage: disks Feb 9 18:56:09.702660 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:56:09.615806 ignition[915]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:09.615826 ignition[915]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:09.619531 ignition[915]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:09.621996 ignition[915]: disks: disks passed Feb 9 18:56:09.622048 ignition[915]: Ignition finished successfully Feb 9 18:56:09.799406 systemd-fsck[923]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 18:56:09.808632 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:56:09.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.838071 systemd[1]: Mounting sysroot.mount... Feb 9 18:56:09.847987 kernel: audit: type=1130 audit(1707504969.813:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:09.860953 systemd[1]: Mounted sysroot.mount. Feb 9 18:56:09.868884 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:56:09.865389 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:56:09.912010 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:56:09.916776 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 18:56:09.925392 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:56:09.925424 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:56:09.931634 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:56:09.982256 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:56:09.987955 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:56:10.012191 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (933) Feb 9 18:56:10.024465 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:56:10.024511 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:56:10.024521 initrd-setup-root[938]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:56:10.036274 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:56:10.039881 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:56:10.058917 initrd-setup-root[964]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:56:10.069060 initrd-setup-root[972]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:56:10.090273 initrd-setup-root[980]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:56:10.444734 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:56:10.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.450232 systemd[1]: Starting ignition-mount.service... Feb 9 18:56:10.479974 kernel: audit: type=1130 audit(1707504970.449:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.475498 systemd[1]: Starting sysroot-boot.service... Feb 9 18:56:10.486531 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:56:10.486642 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:56:10.512858 systemd[1]: Finished sysroot-boot.service. Feb 9 18:56:10.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.540209 kernel: audit: type=1130 audit(1707504970.517:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.549346 ignition[1001]: INFO : Ignition 2.14.0 Feb 9 18:56:10.555195 ignition[1001]: INFO : Stage: mount Feb 9 18:56:10.555195 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:10.555195 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:10.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.602058 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:10.602058 ignition[1001]: INFO : mount: mount passed Feb 9 18:56:10.602058 ignition[1001]: INFO : Ignition finished successfully Feb 9 18:56:10.621733 kernel: audit: type=1130 audit(1707504970.570:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:10.565076 systemd[1]: Finished ignition-mount.service. Feb 9 18:56:11.260502 coreos-metadata[932]: Feb 09 18:56:11.260 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:56:11.271971 coreos-metadata[932]: Feb 09 18:56:11.271 INFO Fetch successful Feb 9 18:56:11.305264 coreos-metadata[932]: Feb 09 18:56:11.305 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:56:11.318498 coreos-metadata[932]: Feb 09 18:56:11.316 INFO Fetch successful Feb 9 18:56:11.324961 coreos-metadata[932]: Feb 09 18:56:11.318 INFO wrote hostname ci-3510.3.2-a-71d57399a1 to /sysroot/etc/hostname Feb 9 18:56:11.333601 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 18:56:11.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:11.360316 systemd[1]: Starting ignition-files.service... Feb 9 18:56:11.369562 kernel: audit: type=1130 audit(1707504971.338:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:11.370331 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:56:11.392380 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) Feb 9 18:56:11.404670 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:56:11.404689 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:56:11.404698 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:56:11.416337 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:56:11.433522 ignition[1030]: INFO : Ignition 2.14.0 Feb 9 18:56:11.433522 ignition[1030]: INFO : Stage: files Feb 9 18:56:11.444202 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:11.444202 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:11.444202 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:11.474535 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:56:11.474535 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:56:11.474535 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:56:11.522977 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:56:11.530861 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:56:11.530861 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:56:11.530809 unknown[1030]: wrote ssh authorized keys file for user: core Feb 9 18:56:11.553531 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 18:56:11.553531 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:56:11.987633 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:56:12.131065 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 18:56:12.148017 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 18:56:12.148017 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:56:12.148017 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 9 18:56:12.564719 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:56:12.828205 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 9 18:56:12.840063 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 18:56:12.840063 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 18:56:13.228284 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:56:13.422535 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 18:56:13.438847 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 18:56:13.438847 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:56:13.438847 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 9 18:56:13.583346 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:56:13.895454 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 9 18:56:13.911502 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 18:56:13.911502 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:56:13.911502 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:56:13.953898 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 18:56:14.242468 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 18:56:14.258481 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:56:14.258481 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:56:14.258481 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:56:14.301750 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 18:56:15.029137 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:56:15.046447 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:56:15.318190 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1032) Feb 9 18:56:15.318215 kernel: audit: type=1130 audit(1707504975.134:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.318226 kernel: audit: type=1130 audit(1707504975.217:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.318235 kernel: audit: type=1131 audit(1707504975.217:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.318245 kernel: audit: type=1130 audit(1707504975.242:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2570372872" Feb 9 18:56:15.318366 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2570372872": device or resource busy Feb 9 18:56:15.318366 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2570372872", trying btrfs: device or resource busy Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2570372872" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2570372872" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2570372872" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2570372872" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3344164384" Feb 9 18:56:15.318366 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3344164384": device or resource busy Feb 9 18:56:15.318366 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3344164384", trying btrfs: device or resource busy Feb 9 18:56:15.318366 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3344164384" Feb 9 18:56:15.614116 kernel: audit: type=1130 audit(1707504975.333:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.614152 kernel: audit: type=1131 audit(1707504975.333:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.614172 kernel: audit: type=1130 audit(1707504975.451:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.614182 kernel: audit: type=1131 audit(1707504975.545:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.079600 systemd[1]: mnt-oem2570372872.mount: Deactivated successfully. Feb 9 18:56:15.624669 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3344164384" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem3344164384" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem3344164384" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1b): [started] processing unit "prepare-helm.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1b): [finished] processing unit "prepare-helm.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1d): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:56:15.624669 ignition[1030]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:56:15.908490 kernel: audit: type=1131 audit(1707504975.732:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.123858 systemd[1]: Finished ignition-files.service. Feb 9 18:56:15.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(1d): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(21): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(22): [started] setting preset to enabled for "prepare-helm.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(23): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:56:15.916095 ignition[1030]: INFO : files: files passed Feb 9 18:56:15.916095 ignition[1030]: INFO : Ignition finished successfully Feb 9 18:56:15.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.161274 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:56:16.110621 initrd-setup-root-after-ignition[1056]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:56:15.176059 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:56:16.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.185754 systemd[1]: Starting ignition-quench.service... Feb 9 18:56:16.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.206141 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:56:16.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.206275 systemd[1]: Finished ignition-quench.service. Feb 9 18:56:16.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.167000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:56:15.218268 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:56:15.257255 systemd[1]: Reached target ignition-complete.target. Feb 9 18:56:15.290049 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:56:16.194450 ignition[1069]: INFO : Ignition 2.14.0 Feb 9 18:56:16.194450 ignition[1069]: INFO : Stage: umount Feb 9 18:56:16.194450 ignition[1069]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:56:16.194450 ignition[1069]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:56:16.194450 ignition[1069]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:56:16.194450 ignition[1069]: INFO : umount: umount passed Feb 9 18:56:16.194450 ignition[1069]: INFO : Ignition finished successfully Feb 9 18:56:16.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.319399 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:56:15.319508 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:56:16.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.333580 systemd[1]: Reached target initrd-fs.target. Feb 9 18:56:16.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.384743 systemd[1]: Reached target initrd.target. Feb 9 18:56:15.404777 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:56:16.316651 kernel: hv_netvsc 002248b6-ba42-0022-48b6-ba42002248b6 eth0: Data path switched from VF: enP63143s1 Feb 9 18:56:16.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.405698 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:56:15.443512 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:56:15.452805 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:56:15.493227 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:56:16.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.500383 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:56:16.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.515810 systemd[1]: Stopped target timers.target. Feb 9 18:56:16.379046 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 9 18:56:16.379067 kernel: audit: type=1131 audit(1707504976.347:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.529953 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:56:16.404563 kernel: audit: type=1131 audit(1707504976.383:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.530037 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:56:15.545741 systemd[1]: Stopped target initrd.target. Feb 9 18:56:16.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.579431 systemd[1]: Stopped target basic.target. Feb 9 18:56:16.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.597386 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:56:16.463031 kernel: audit: type=1130 audit(1707504976.415:77): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:16.463053 kernel: audit: type=1131 audit(1707504976.415:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.619384 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:56:15.629395 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:56:15.646322 systemd[1]: Stopped target remote-fs.target. Feb 9 18:56:15.660646 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:56:16.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.674918 systemd[1]: Stopped target sysinit.target. Feb 9 18:56:15.689396 systemd[1]: Stopped target local-fs.target. Feb 9 18:56:15.700307 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:56:16.519102 kernel: audit: type=1131 audit(1707504976.480:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:15.711193 systemd[1]: Stopped target swap.target. Feb 9 18:56:15.721547 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:56:15.721628 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:56:15.733197 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:56:15.762115 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:56:15.762194 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:56:15.777597 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:56:15.777638 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:56:15.794113 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:56:15.794169 systemd[1]: Stopped ignition-files.service. Feb 9 18:56:16.575663 iscsid[876]: iscsid shutting down. Feb 9 18:56:15.805456 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 18:56:15.805498 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 18:56:15.818126 systemd[1]: Stopping ignition-mount.service... Feb 9 18:56:15.833961 systemd[1]: Stopping iscsiuio.service... Feb 9 18:56:15.838835 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:56:15.867880 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:56:15.867960 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:56:15.880597 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:56:15.880653 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:56:15.897029 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:56:15.897145 systemd[1]: Stopped iscsiuio.service. Feb 9 18:56:15.912314 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:56:15.912393 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:56:15.920788 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:56:15.920880 systemd[1]: Stopped ignition-mount.service. Feb 9 18:56:15.932678 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:56:15.932724 systemd[1]: Stopped ignition-disks.service. Feb 9 18:56:15.944520 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:56:16.576197 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 18:56:15.944562 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:56:15.958320 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:56:15.958357 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:56:15.972060 systemd[1]: Stopped target network.target. Feb 9 18:56:15.994772 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:56:15.994836 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:56:16.008785 systemd[1]: Stopped target paths.target. Feb 9 18:56:16.020887 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:56:16.029184 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:56:16.034409 systemd[1]: Stopped target slices.target. Feb 9 18:56:16.048889 systemd[1]: Stopped target sockets.target. Feb 9 18:56:16.061809 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:56:16.061838 systemd[1]: Closed iscsid.socket. Feb 9 18:56:16.075065 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:56:16.075098 systemd[1]: Closed iscsiuio.socket. Feb 9 18:56:16.088387 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:56:16.088428 systemd[1]: Stopped ignition-setup.service. Feb 9 18:56:16.096543 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:56:16.104967 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:56:16.115375 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:56:16.115884 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:56:16.115985 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:56:16.128064 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:56:16.128132 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:56:16.138091 systemd-networkd[868]: eth0: DHCPv6 lease lost Feb 9 18:56:16.576000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:56:16.144375 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:56:16.144485 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:56:16.158602 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:56:16.158703 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:56:16.168305 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:56:16.168346 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:56:16.176752 systemd[1]: Stopping network-cleanup.service... Feb 9 18:56:16.190340 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:56:16.190405 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:56:16.199064 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:56:16.199227 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:56:16.210555 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:56:16.210602 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:56:16.215284 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:56:16.227440 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:56:16.241097 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:56:16.241314 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:56:16.252652 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:56:16.252701 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:56:16.261253 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:56:16.261282 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:56:16.270735 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:56:16.270787 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:56:16.280371 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:56:16.280418 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:56:16.301088 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:56:16.301149 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:56:16.316116 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:56:16.329790 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 18:56:16.329871 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 18:56:16.342687 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:56:16.342743 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:56:16.374817 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:56:16.374891 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:56:16.384853 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 18:56:16.385385 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:56:16.406282 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:56:16.473095 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:56:16.473204 systemd[1]: Stopped network-cleanup.service. Feb 9 18:56:16.502036 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:56:16.514286 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:56:16.528583 systemd[1]: Switching root. Feb 9 18:56:16.577868 systemd-journald[276]: Journal stopped Feb 9 18:56:28.862681 kernel: audit: type=1334 audit(1707504976.576:80): prog-id=9 op=UNLOAD Feb 9 18:56:28.862700 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:56:28.862711 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:56:28.862720 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:56:28.862728 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:56:28.862736 kernel: SELinux: policy capability open_perms=1 Feb 9 18:56:28.862745 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:56:28.862753 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:56:28.862760 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:56:28.862768 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:56:28.862777 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:56:28.862785 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:56:28.862793 kernel: audit: type=1403 audit(1707504979.083:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:56:28.862803 systemd[1]: Successfully loaded SELinux policy in 348.098ms. Feb 9 18:56:28.862815 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 23.057ms. Feb 9 18:56:28.862827 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:56:28.862836 systemd[1]: Detected virtualization microsoft. Feb 9 18:56:28.862845 systemd[1]: Detected architecture arm64. Feb 9 18:56:28.862854 systemd[1]: Detected first boot. Feb 9 18:56:28.862863 systemd[1]: Hostname set to . Feb 9 18:56:28.862872 systemd[1]: Initializing machine ID from random generator. Feb 9 18:56:28.862881 kernel: audit: type=1400 audit(1707504979.846:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:56:28.862891 kernel: audit: type=1400 audit(1707504979.846:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:56:28.862900 kernel: audit: type=1334 audit(1707504979.864:84): prog-id=10 op=LOAD Feb 9 18:56:28.862908 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:56:28.862917 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:56:28.862926 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:56:28.862935 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:56:28.862947 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:56:28.862956 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 9 18:56:28.862964 kernel: audit: type=1334 audit(1707504988.152:90): prog-id=12 op=LOAD Feb 9 18:56:28.862973 kernel: audit: type=1334 audit(1707504988.152:91): prog-id=3 op=UNLOAD Feb 9 18:56:28.862981 kernel: audit: type=1334 audit(1707504988.158:92): prog-id=13 op=LOAD Feb 9 18:56:28.862990 kernel: audit: type=1334 audit(1707504988.164:93): prog-id=14 op=LOAD Feb 9 18:56:28.862998 kernel: audit: type=1334 audit(1707504988.164:94): prog-id=4 op=UNLOAD Feb 9 18:56:28.863008 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:56:28.863016 kernel: audit: type=1334 audit(1707504988.164:95): prog-id=5 op=UNLOAD Feb 9 18:56:28.863026 kernel: audit: type=1334 audit(1707504988.169:96): prog-id=15 op=LOAD Feb 9 18:56:28.863035 systemd[1]: Stopped iscsid.service. Feb 9 18:56:28.863044 kernel: audit: type=1334 audit(1707504988.169:97): prog-id=12 op=UNLOAD Feb 9 18:56:28.863055 kernel: audit: type=1334 audit(1707504988.175:98): prog-id=16 op=LOAD Feb 9 18:56:28.863064 kernel: audit: type=1334 audit(1707504988.180:99): prog-id=17 op=LOAD Feb 9 18:56:28.863073 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:56:28.863082 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:56:28.863092 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:56:28.863102 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:56:28.863111 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:56:28.863121 systemd[1]: Created slice system-getty.slice. Feb 9 18:56:28.863130 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:56:28.863139 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:56:28.863148 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:56:28.863180 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:56:28.863204 systemd[1]: Created slice user.slice. Feb 9 18:56:28.863215 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:56:28.863224 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:56:28.863233 systemd[1]: Set up automount boot.automount. Feb 9 18:56:28.863243 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:56:28.863253 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:56:28.863262 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:56:28.863271 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:56:28.863282 systemd[1]: Reached target integritysetup.target. Feb 9 18:56:28.863291 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:56:28.863300 systemd[1]: Reached target remote-fs.target. Feb 9 18:56:28.863309 systemd[1]: Reached target slices.target. Feb 9 18:56:28.863319 systemd[1]: Reached target swap.target. Feb 9 18:56:28.863328 systemd[1]: Reached target torcx.target. Feb 9 18:56:28.863337 systemd[1]: Reached target veritysetup.target. Feb 9 18:56:28.863346 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:56:28.863357 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:56:28.863366 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:56:28.863376 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:56:28.863385 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:56:28.863394 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:56:28.863403 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:56:28.876475 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:56:28.876507 systemd[1]: Mounting media.mount... Feb 9 18:56:28.876518 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:56:28.876528 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:56:28.876538 systemd[1]: Mounting tmp.mount... Feb 9 18:56:28.876548 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:56:28.876559 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:56:28.876569 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:56:28.876579 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:56:28.876596 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:56:28.876606 systemd[1]: Starting modprobe@drm.service... Feb 9 18:56:28.876615 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:56:28.876625 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:56:28.876634 systemd[1]: Starting modprobe@loop.service... Feb 9 18:56:28.876644 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:56:28.876654 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:56:28.876664 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:56:28.876674 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:56:28.876685 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:56:28.876694 systemd[1]: Stopped systemd-journald.service. Feb 9 18:56:28.876704 kernel: loop: module loaded Feb 9 18:56:28.876714 systemd[1]: systemd-journald.service: Consumed 3.189s CPU time. Feb 9 18:56:28.876723 kernel: fuse: init (API version 7.34) Feb 9 18:56:28.876733 systemd[1]: Starting systemd-journald.service... Feb 9 18:56:28.876742 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:56:28.876752 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:56:28.876761 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:56:28.876772 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:56:28.876782 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:56:28.876791 systemd[1]: Stopped verity-setup.service. Feb 9 18:56:28.876801 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:56:28.876810 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:56:28.876820 systemd[1]: Mounted media.mount. Feb 9 18:56:28.876834 systemd-journald[1208]: Journal started Feb 9 18:56:28.876887 systemd-journald[1208]: Runtime Journal (/run/log/journal/7b8bf04a95444402a29eeb8d0c5a94c7) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:56:19.083000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:56:19.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:56:19.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:56:19.864000 audit: BPF prog-id=10 op=LOAD Feb 9 18:56:19.864000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:56:19.880000 audit: BPF prog-id=11 op=LOAD Feb 9 18:56:19.880000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:56:21.019000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:56:21.019000 audit[1102]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458c4 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:21.019000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:56:21.028000 audit[1102]: AVC avc: denied { associate } for pid=1102 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:56:21.028000 audit[1102]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001459a9 a2=1ed a3=0 items=2 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:21.028000 audit: CWD cwd="/" Feb 9 18:56:21.028000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:21.028000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:21.028000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:56:28.152000 audit: BPF prog-id=12 op=LOAD Feb 9 18:56:28.152000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:56:28.158000 audit: BPF prog-id=13 op=LOAD Feb 9 18:56:28.164000 audit: BPF prog-id=14 op=LOAD Feb 9 18:56:28.164000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:56:28.164000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:56:28.169000 audit: BPF prog-id=15 op=LOAD Feb 9 18:56:28.169000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:56:28.175000 audit: BPF prog-id=16 op=LOAD Feb 9 18:56:28.180000 audit: BPF prog-id=17 op=LOAD Feb 9 18:56:28.180000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:56:28.180000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:56:28.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.208000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:56:28.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.771000 audit: BPF prog-id=18 op=LOAD Feb 9 18:56:28.771000 audit: BPF prog-id=19 op=LOAD Feb 9 18:56:28.772000 audit: BPF prog-id=20 op=LOAD Feb 9 18:56:28.772000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:56:28.772000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:56:28.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.859000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:56:28.859000 audit[1208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffccfa5ca0 a2=4000 a3=1 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:28.859000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:56:20.972719 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:56:28.151033 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:56:20.996129 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:56:28.181493 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:56:20.996200 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:56:28.181873 systemd[1]: systemd-journald.service: Consumed 3.189s CPU time. Feb 9 18:56:20.996265 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:56:20.996283 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:56:20.996333 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:56:20.996355 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:56:20.996563 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:56:20.996596 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:56:20.996609 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:20Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:56:21.007740 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:56:21.007801 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:56:21.007834 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:56:21.007860 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:56:21.007884 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:56:21.007897 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:21Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:56:26.970096 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:56:26.970373 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:56:26.970465 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:56:26.970623 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:56:26.970670 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:56:26.970723 /usr/lib/systemd/system-generators/torcx-generator[1102]: time="2024-02-09T18:56:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:56:28.889447 systemd[1]: Started systemd-journald.service. Feb 9 18:56:28.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.890214 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:56:28.894970 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:56:28.899707 systemd[1]: Mounted tmp.mount. Feb 9 18:56:28.903904 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:56:28.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.908983 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:56:28.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.914020 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:56:28.914147 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:56:28.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.919472 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:56:28.919591 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:56:28.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.924860 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:56:28.924984 systemd[1]: Finished modprobe@drm.service. Feb 9 18:56:28.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.930319 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:56:28.930553 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:56:28.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.936082 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:56:28.936216 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:56:28.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.940861 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:56:28.940992 systemd[1]: Finished modprobe@loop.service. Feb 9 18:56:28.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.945850 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:56:28.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.951226 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:56:28.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.956535 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:56:28.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:28.961775 systemd[1]: Reached target network-pre.target. Feb 9 18:56:28.968417 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:56:28.974076 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:56:28.978368 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:56:28.980276 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:56:28.986528 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:56:28.991430 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:56:28.992629 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:56:28.997407 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:56:28.998629 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:56:29.004015 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:56:29.010562 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:56:29.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:29.015926 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:56:29.021461 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:56:29.027451 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:56:29.039135 udevadm[1222]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 18:56:29.042699 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:56:29.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:29.047861 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:56:29.051073 systemd-journald[1208]: Time spent on flushing to /var/log/journal/7b8bf04a95444402a29eeb8d0c5a94c7 is 14.611ms for 1150 entries. Feb 9 18:56:29.051073 systemd-journald[1208]: System Journal (/var/log/journal/7b8bf04a95444402a29eeb8d0c5a94c7) is 8.0M, max 2.6G, 2.6G free. Feb 9 18:56:29.140053 systemd-journald[1208]: Received client request to flush runtime journal. Feb 9 18:56:29.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:29.082405 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:56:29.141036 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:56:29.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:29.600934 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:56:29.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:29.607126 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:56:29.933025 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:56:29.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.130728 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:56:30.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.136000 audit: BPF prog-id=21 op=LOAD Feb 9 18:56:30.136000 audit: BPF prog-id=22 op=LOAD Feb 9 18:56:30.136000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:56:30.136000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:56:30.137749 systemd[1]: Starting systemd-udevd.service... Feb 9 18:56:30.155586 systemd-udevd[1227]: Using default interface naming scheme 'v252'. Feb 9 18:56:30.407320 systemd[1]: Started systemd-udevd.service. Feb 9 18:56:30.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.418000 audit: BPF prog-id=23 op=LOAD Feb 9 18:56:30.419459 systemd[1]: Starting systemd-networkd.service... Feb 9 18:56:30.462739 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:56:30.468000 audit: BPF prog-id=24 op=LOAD Feb 9 18:56:30.468000 audit: BPF prog-id=25 op=LOAD Feb 9 18:56:30.468000 audit: BPF prog-id=26 op=LOAD Feb 9 18:56:30.469463 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:56:30.538000 audit[1246]: AVC avc: denied { confidentiality } for pid=1246 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:56:30.544518 systemd[1]: Started systemd-userdbd.service. Feb 9 18:56:30.545205 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 18:56:30.545268 kernel: hv_vmbus: registering driver hv_balloon Feb 9 18:56:30.561676 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 18:56:30.561783 kernel: hv_vmbus: registering driver hv_utils Feb 9 18:56:30.561814 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 18:56:30.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.567187 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 18:56:30.570222 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 18:56:30.579317 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 18:56:30.579454 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 18:56:30.594739 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 18:56:30.594848 kernel: Console: switching to colour dummy device 80x25 Feb 9 18:56:30.594912 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 18:56:30.199138 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:56:30.253461 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:56:30.253493 systemd-journald[1208]: Time jumped backwards, rotating. Feb 9 18:56:30.538000 audit[1246]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaada6c1e50 a1=aa2c a2=ffff968724b0 a3=aaaada618010 items=12 ppid=1227 pid=1246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:30.538000 audit: CWD cwd="/" Feb 9 18:56:30.538000 audit: PATH item=0 name=(null) inode=4057 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=1 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=2 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=3 name=(null) inode=11448 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=4 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=5 name=(null) inode=11449 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=6 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=7 name=(null) inode=11450 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=8 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=9 name=(null) inode=11451 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=10 name=(null) inode=11447 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PATH item=11 name=(null) inode=11452 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:56:30.538000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:56:30.405913 systemd-networkd[1248]: lo: Link UP Feb 9 18:56:30.406154 systemd-networkd[1248]: lo: Gained carrier Feb 9 18:56:30.406644 systemd-networkd[1248]: Enumeration completed Feb 9 18:56:30.406790 systemd[1]: Started systemd-networkd.service. Feb 9 18:56:30.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.413546 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:56:30.430847 systemd-networkd[1248]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:56:30.479313 kernel: mlx5_core f6a7:00:02.0 enP63143s1: Link up Feb 9 18:56:30.498272 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1243) Feb 9 18:56:30.506267 kernel: hv_netvsc 002248b6-ba42-0022-48b6-ba42002248b6 eth0: Data path switched to VF: enP63143s1 Feb 9 18:56:30.509449 systemd-networkd[1248]: enP63143s1: Link UP Feb 9 18:56:30.509656 systemd-networkd[1248]: eth0: Link UP Feb 9 18:56:30.509731 systemd-networkd[1248]: eth0: Gained carrier Feb 9 18:56:30.513654 systemd-networkd[1248]: enP63143s1: Gained carrier Feb 9 18:56:30.519361 systemd-networkd[1248]: eth0: DHCPv4 address 10.200.20.14/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:56:30.521517 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:56:30.532669 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:56:30.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.538473 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:56:30.875743 lvm[1307]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:56:30.924112 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:56:30.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.929533 systemd[1]: Reached target cryptsetup.target. Feb 9 18:56:30.936015 systemd[1]: Starting lvm2-activation.service... Feb 9 18:56:30.939926 lvm[1308]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:56:30.959186 systemd[1]: Finished lvm2-activation.service. Feb 9 18:56:30.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:30.964359 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:56:30.969022 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:56:30.969050 systemd[1]: Reached target local-fs.target. Feb 9 18:56:30.973490 systemd[1]: Reached target machines.target. Feb 9 18:56:30.979278 systemd[1]: Starting ldconfig.service... Feb 9 18:56:30.983432 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:56:30.983501 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:56:30.984686 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:56:30.989820 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:56:30.996366 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:56:31.000920 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:56:31.000974 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:56:31.002107 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:56:31.026595 systemd-tmpfiles[1313]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:56:31.035548 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1310 (bootctl) Feb 9 18:56:31.036799 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:56:31.276732 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:56:31.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:31.574407 systemd-tmpfiles[1313]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:56:31.610418 systemd-tmpfiles[1313]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:56:32.173240 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:56:32.173859 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:56:32.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:32.192460 systemd-fsck[1318]: fsck.fat 4.2 (2021-01-31) Feb 9 18:56:32.192460 systemd-fsck[1318]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 18:56:32.195595 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:56:32.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:32.203707 systemd[1]: Mounting boot.mount... Feb 9 18:56:32.220415 systemd[1]: Mounted boot.mount. Feb 9 18:56:32.231815 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:56:32.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:32.380409 systemd-networkd[1248]: eth0: Gained IPv6LL Feb 9 18:56:32.386175 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:56:32.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.629521 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:56:33.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.636666 systemd[1]: Starting audit-rules.service... Feb 9 18:56:33.639285 kernel: kauditd_printk_skb: 80 callbacks suppressed Feb 9 18:56:33.639341 kernel: audit: type=1130 audit(1707504993.633:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.661799 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:56:33.667641 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:56:33.672000 audit: BPF prog-id=27 op=LOAD Feb 9 18:56:33.679273 kernel: audit: type=1334 audit(1707504993.672:164): prog-id=27 op=LOAD Feb 9 18:56:33.679929 systemd[1]: Starting systemd-resolved.service... Feb 9 18:56:33.684000 audit: BPF prog-id=28 op=LOAD Feb 9 18:56:33.691064 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:56:33.693271 kernel: audit: type=1334 audit(1707504993.684:165): prog-id=28 op=LOAD Feb 9 18:56:33.698430 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:56:33.742146 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:56:33.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.768973 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:56:33.766000 audit[1333]: SYSTEM_BOOT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.787826 kernel: audit: type=1130 audit(1707504993.746:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.787918 kernel: audit: type=1127 audit(1707504993.766:167): pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.788173 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:56:33.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.811303 kernel: audit: type=1130 audit(1707504993.791:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.833523 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:56:33.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.838381 systemd[1]: Reached target time-set.target. Feb 9 18:56:33.859966 kernel: audit: type=1130 audit(1707504993.837:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.919696 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:56:33.926108 systemd-resolved[1328]: Positive Trust Anchors: Feb 9 18:56:33.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.926481 systemd-resolved[1328]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:56:33.926578 systemd-resolved[1328]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:56:33.945287 kernel: audit: type=1130 audit(1707504993.924:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:33.981626 systemd-resolved[1328]: Using system hostname 'ci-3510.3.2-a-71d57399a1'. Feb 9 18:56:33.983487 systemd[1]: Started systemd-resolved.service. Feb 9 18:56:33.988341 systemd[1]: Reached target network.target. Feb 9 18:56:33.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:34.013934 systemd[1]: Reached target network-online.target. Feb 9 18:56:34.020880 kernel: audit: type=1130 audit(1707504993.987:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:56:34.021698 systemd[1]: Reached target nss-lookup.target. Feb 9 18:56:34.148000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:56:34.150331 augenrules[1345]: No rules Feb 9 18:56:34.148000 audit[1345]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffea656d30 a2=420 a3=0 items=0 ppid=1324 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:56:34.162623 systemd[1]: Finished audit-rules.service. Feb 9 18:56:34.148000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:56:34.163283 kernel: audit: type=1305 audit(1707504994.148:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:56:34.278639 systemd-timesyncd[1329]: Contacted time server 50.205.57.38:123 (0.flatcar.pool.ntp.org). Feb 9 18:56:34.278704 systemd-timesyncd[1329]: Initial clock synchronization to Fri 2024-02-09 18:56:34.275916 UTC. Feb 9 18:56:40.356206 ldconfig[1309]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:56:40.377221 systemd[1]: Finished ldconfig.service. Feb 9 18:56:40.383422 systemd[1]: Starting systemd-update-done.service... Feb 9 18:56:40.458614 systemd[1]: Finished systemd-update-done.service. Feb 9 18:56:40.464550 systemd[1]: Reached target sysinit.target. Feb 9 18:56:40.469106 systemd[1]: Started motdgen.path. Feb 9 18:56:40.472876 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:56:40.479198 systemd[1]: Started logrotate.timer. Feb 9 18:56:40.483420 systemd[1]: Started mdadm.timer. Feb 9 18:56:40.487052 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:56:40.492095 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:56:40.492130 systemd[1]: Reached target paths.target. Feb 9 18:56:40.496222 systemd[1]: Reached target timers.target. Feb 9 18:56:40.501090 systemd[1]: Listening on dbus.socket. Feb 9 18:56:40.506357 systemd[1]: Starting docker.socket... Feb 9 18:56:40.535895 systemd[1]: Listening on sshd.socket. Feb 9 18:56:40.542136 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:56:40.542703 systemd[1]: Listening on docker.socket. Feb 9 18:56:40.548056 systemd[1]: Reached target sockets.target. Feb 9 18:56:40.553161 systemd[1]: Reached target basic.target. Feb 9 18:56:40.558143 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:56:40.558171 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:56:40.559288 systemd[1]: Starting containerd.service... Feb 9 18:56:40.564197 systemd[1]: Starting dbus.service... Feb 9 18:56:40.568758 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:56:40.574871 systemd[1]: Starting extend-filesystems.service... Feb 9 18:56:40.582183 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:56:40.583339 systemd[1]: Starting motdgen.service... Feb 9 18:56:40.588158 systemd[1]: Started nvidia.service. Feb 9 18:56:40.593225 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:56:40.598724 systemd[1]: Starting prepare-critools.service... Feb 9 18:56:40.605051 systemd[1]: Starting prepare-helm.service... Feb 9 18:56:40.609958 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:56:40.617018 systemd[1]: Starting sshd-keygen.service... Feb 9 18:56:40.623099 systemd[1]: Starting systemd-logind.service... Feb 9 18:56:40.627065 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:56:40.627128 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:56:40.627591 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:56:40.628280 systemd[1]: Starting update-engine.service... Feb 9 18:56:40.633324 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:56:40.644734 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:56:40.644951 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:56:40.658146 jq[1355]: false Feb 9 18:56:40.658627 jq[1375]: true Feb 9 18:56:40.677678 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:56:40.677847 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:56:40.728521 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:56:40.728701 systemd[1]: Finished motdgen.service. Feb 9 18:56:40.732908 jq[1380]: true Feb 9 18:56:40.754533 systemd-logind[1370]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 9 18:56:40.759184 systemd-logind[1370]: New seat seat0. Feb 9 18:56:40.760548 extend-filesystems[1356]: Found sda Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda1 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda2 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda3 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found usr Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda4 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda6 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda7 Feb 9 18:56:40.768406 extend-filesystems[1356]: Found sda9 Feb 9 18:56:40.768406 extend-filesystems[1356]: Checking size of /dev/sda9 Feb 9 18:56:40.822156 env[1381]: time="2024-02-09T18:56:40.818149952Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:56:40.845047 env[1381]: time="2024-02-09T18:56:40.844997732Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:56:40.845359 env[1381]: time="2024-02-09T18:56:40.845340892Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.846827 env[1381]: time="2024-02-09T18:56:40.846798679Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:56:40.846906 env[1381]: time="2024-02-09T18:56:40.846891868Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.847163 env[1381]: time="2024-02-09T18:56:40.847140199Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:56:40.847240 env[1381]: time="2024-02-09T18:56:40.847225589Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.847329 env[1381]: time="2024-02-09T18:56:40.847313898Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:56:40.847383 env[1381]: time="2024-02-09T18:56:40.847365892Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.847520 env[1381]: time="2024-02-09T18:56:40.847502716Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.847756 env[1381]: time="2024-02-09T18:56:40.847736608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:56:40.848209 env[1381]: time="2024-02-09T18:56:40.847927625Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:56:40.848316 env[1381]: time="2024-02-09T18:56:40.848299821Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:56:40.848552 env[1381]: time="2024-02-09T18:56:40.848409288Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:56:40.848651 env[1381]: time="2024-02-09T18:56:40.848635662Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:56:40.867996 env[1381]: time="2024-02-09T18:56:40.867921178Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:56:40.868129 env[1381]: time="2024-02-09T18:56:40.868112315Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:56:40.868191 env[1381]: time="2024-02-09T18:56:40.868178307Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:56:40.868297 env[1381]: time="2024-02-09T18:56:40.868280175Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.868371 env[1381]: time="2024-02-09T18:56:40.868357126Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.868440 env[1381]: time="2024-02-09T18:56:40.868427198Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.868500 env[1381]: time="2024-02-09T18:56:40.868486871Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.868899 env[1381]: time="2024-02-09T18:56:40.868874105Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.868985 env[1381]: time="2024-02-09T18:56:40.868969534Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.869045 env[1381]: time="2024-02-09T18:56:40.869031806Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.869109 env[1381]: time="2024-02-09T18:56:40.869096079Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.869166 env[1381]: time="2024-02-09T18:56:40.869152952Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:56:40.869502 env[1381]: time="2024-02-09T18:56:40.869369486Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:56:40.869671 env[1381]: time="2024-02-09T18:56:40.869652173Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:56:40.869980 env[1381]: time="2024-02-09T18:56:40.869957657Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:56:40.870087 env[1381]: time="2024-02-09T18:56:40.870071203Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870197 env[1381]: time="2024-02-09T18:56:40.870180670Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:56:40.870323 env[1381]: time="2024-02-09T18:56:40.870304456Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870397 env[1381]: time="2024-02-09T18:56:40.870384206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870464 env[1381]: time="2024-02-09T18:56:40.870450718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870523 env[1381]: time="2024-02-09T18:56:40.870509751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870581 env[1381]: time="2024-02-09T18:56:40.870568864Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870642 env[1381]: time="2024-02-09T18:56:40.870628737Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870701 env[1381]: time="2024-02-09T18:56:40.870688730Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870756 env[1381]: time="2024-02-09T18:56:40.870743604Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.870821 env[1381]: time="2024-02-09T18:56:40.870807756Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:56:40.870991 env[1381]: time="2024-02-09T18:56:40.870973056Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.871067 env[1381]: time="2024-02-09T18:56:40.871051767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.871130 env[1381]: time="2024-02-09T18:56:40.871116719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.871189 env[1381]: time="2024-02-09T18:56:40.871175872Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:56:40.871276 env[1381]: time="2024-02-09T18:56:40.871231786Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:56:40.871348 env[1381]: time="2024-02-09T18:56:40.871333654Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:56:40.871420 env[1381]: time="2024-02-09T18:56:40.871405405Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:56:40.871502 env[1381]: time="2024-02-09T18:56:40.871488075Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:56:40.871772 env[1381]: time="2024-02-09T18:56:40.871723528Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.871982017Z" level=info msg="Connect containerd service" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.872126520Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.872700332Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.872933184Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.872967620Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.873009495Z" level=info msg="containerd successfully booted in 0.062864s" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880296872Z" level=info msg="Start subscribing containerd event" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880366704Z" level=info msg="Start recovering state" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880439336Z" level=info msg="Start event monitor" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880457333Z" level=info msg="Start snapshots syncer" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880470852Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:56:40.905225 env[1381]: time="2024-02-09T18:56:40.880479371Z" level=info msg="Start streaming server" Feb 9 18:56:40.905517 tar[1378]: crictl Feb 9 18:56:40.905688 tar[1377]: ./ Feb 9 18:56:40.905688 tar[1377]: ./macvlan Feb 9 18:56:40.905817 tar[1379]: linux-arm64/helm Feb 9 18:56:40.905932 extend-filesystems[1356]: Old size kept for /dev/sda9 Feb 9 18:56:40.905932 extend-filesystems[1356]: Found sr0 Feb 9 18:56:40.873097 systemd[1]: Started containerd.service. Feb 9 18:56:40.890984 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:56:40.891157 systemd[1]: Finished extend-filesystems.service. Feb 9 18:56:40.934281 bash[1400]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:56:40.935192 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:56:40.992369 dbus-daemon[1354]: [system] SELinux support is enabled Feb 9 18:56:40.992544 systemd[1]: Started dbus.service. Feb 9 18:56:40.998015 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:56:40.998042 systemd[1]: Reached target system-config.target. Feb 9 18:56:41.006307 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:56:41.006331 systemd[1]: Reached target user-config.target. Feb 9 18:56:41.014036 systemd[1]: Started systemd-logind.service. Feb 9 18:56:41.029417 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:56:41.047595 tar[1377]: ./static Feb 9 18:56:41.113468 tar[1377]: ./vlan Feb 9 18:56:41.178250 tar[1377]: ./portmap Feb 9 18:56:41.238539 tar[1377]: ./host-local Feb 9 18:56:41.290743 tar[1377]: ./vrf Feb 9 18:56:41.343358 tar[1377]: ./bridge Feb 9 18:56:41.405548 tar[1377]: ./tuning Feb 9 18:56:41.462705 tar[1377]: ./firewall Feb 9 18:56:41.523380 tar[1377]: ./host-device Feb 9 18:56:41.551779 update_engine[1373]: I0209 18:56:41.538800 1373 main.cc:92] Flatcar Update Engine starting Feb 9 18:56:41.587756 tar[1377]: ./sbr Feb 9 18:56:41.608548 systemd[1]: Started update-engine.service. Feb 9 18:56:41.615744 update_engine[1373]: I0209 18:56:41.615700 1373 update_check_scheduler.cc:74] Next update check in 8m21s Feb 9 18:56:41.617564 systemd[1]: Started locksmithd.service. Feb 9 18:56:41.651532 tar[1377]: ./loopback Feb 9 18:56:41.670123 tar[1379]: linux-arm64/LICENSE Feb 9 18:56:41.670123 tar[1379]: linux-arm64/README.md Feb 9 18:56:41.679319 systemd[1]: Finished prepare-helm.service. Feb 9 18:56:41.696384 tar[1377]: ./dhcp Feb 9 18:56:41.771439 tar[1377]: ./ptp Feb 9 18:56:41.803830 tar[1377]: ./ipvlan Feb 9 18:56:41.836087 tar[1377]: ./bandwidth Feb 9 18:56:41.848006 systemd[1]: Finished prepare-critools.service. Feb 9 18:56:41.950376 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:56:43.008208 locksmithd[1460]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:56:44.599494 sshd_keygen[1374]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:56:44.623799 systemd[1]: Finished sshd-keygen.service. Feb 9 18:56:44.631128 systemd[1]: Starting issuegen.service... Feb 9 18:56:44.636498 systemd[1]: Started waagent.service. Feb 9 18:56:44.642164 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:56:44.642363 systemd[1]: Finished issuegen.service. Feb 9 18:56:44.648538 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:56:44.680728 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:56:44.688094 systemd[1]: Started getty@tty1.service. Feb 9 18:56:44.693814 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:56:44.698675 systemd[1]: Reached target getty.target. Feb 9 18:56:44.703008 systemd[1]: Reached target multi-user.target. Feb 9 18:56:44.709021 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:56:44.716742 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:56:44.716902 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:56:44.722588 systemd[1]: Startup finished in 756ms (kernel) + 16.877s (initrd) + 26.610s (userspace) = 44.245s. Feb 9 18:56:45.342369 login[1483]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 18:56:45.343128 login[1482]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:56:45.399380 systemd[1]: Created slice user-500.slice. Feb 9 18:56:45.400517 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:56:45.402420 systemd-logind[1370]: New session 2 of user core. Feb 9 18:56:45.432335 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:56:45.433782 systemd[1]: Starting user@500.service... Feb 9 18:56:45.449422 (systemd)[1486]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:56:45.641143 systemd[1486]: Queued start job for default target default.target. Feb 9 18:56:45.642338 systemd[1486]: Reached target paths.target. Feb 9 18:56:45.642463 systemd[1486]: Reached target sockets.target. Feb 9 18:56:45.642535 systemd[1486]: Reached target timers.target. Feb 9 18:56:45.642601 systemd[1486]: Reached target basic.target. Feb 9 18:56:45.642707 systemd[1486]: Reached target default.target. Feb 9 18:56:45.642776 systemd[1]: Started user@500.service. Feb 9 18:56:45.643522 systemd[1486]: Startup finished in 188ms. Feb 9 18:56:45.643651 systemd[1]: Started session-2.scope. Feb 9 18:56:46.343830 login[1483]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:56:46.348463 systemd[1]: Started session-1.scope. Feb 9 18:56:46.348805 systemd-logind[1370]: New session 1 of user core. Feb 9 18:56:50.798150 waagent[1480]: 2024-02-09T18:56:50.798043Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 18:56:50.817390 waagent[1480]: 2024-02-09T18:56:50.817299Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 18:56:50.822745 waagent[1480]: 2024-02-09T18:56:50.822665Z INFO Daemon Daemon Python: 3.9.16 Feb 9 18:56:50.827648 waagent[1480]: 2024-02-09T18:56:50.827533Z INFO Daemon Daemon Run daemon Feb 9 18:56:50.832708 waagent[1480]: 2024-02-09T18:56:50.832642Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 18:56:50.850641 waagent[1480]: 2024-02-09T18:56:50.850516Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:56:50.865803 waagent[1480]: 2024-02-09T18:56:50.865672Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:56:50.875969 waagent[1480]: 2024-02-09T18:56:50.875882Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:56:50.881399 waagent[1480]: 2024-02-09T18:56:50.881314Z INFO Daemon Daemon Using waagent for provisioning Feb 9 18:56:50.887386 waagent[1480]: 2024-02-09T18:56:50.887312Z INFO Daemon Daemon Activate resource disk Feb 9 18:56:50.892445 waagent[1480]: 2024-02-09T18:56:50.892372Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 18:56:50.907142 waagent[1480]: 2024-02-09T18:56:50.907063Z INFO Daemon Daemon Found device: None Feb 9 18:56:50.911771 waagent[1480]: 2024-02-09T18:56:50.911703Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 18:56:50.920689 waagent[1480]: 2024-02-09T18:56:50.920617Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 18:56:50.932797 waagent[1480]: 2024-02-09T18:56:50.932727Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:56:50.938949 waagent[1480]: 2024-02-09T18:56:50.938875Z INFO Daemon Daemon Running default provisioning handler Feb 9 18:56:50.951997 waagent[1480]: 2024-02-09T18:56:50.951860Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:56:50.967543 waagent[1480]: 2024-02-09T18:56:50.967406Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:56:50.977806 waagent[1480]: 2024-02-09T18:56:50.977714Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:56:50.983384 waagent[1480]: 2024-02-09T18:56:50.983302Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 18:56:51.005215 waagent[1480]: 2024-02-09T18:56:51.005090Z INFO Daemon Daemon Successfully mounted dvd Feb 9 18:56:51.129502 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 18:56:51.167415 waagent[1480]: 2024-02-09T18:56:51.167265Z INFO Daemon Daemon Detect protocol endpoint Feb 9 18:56:51.173804 waagent[1480]: 2024-02-09T18:56:51.173307Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:56:51.179371 waagent[1480]: 2024-02-09T18:56:51.179287Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 18:56:51.186320 waagent[1480]: 2024-02-09T18:56:51.186230Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 18:56:51.192163 waagent[1480]: 2024-02-09T18:56:51.192094Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 18:56:51.197647 waagent[1480]: 2024-02-09T18:56:51.197578Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 18:56:51.369932 waagent[1480]: 2024-02-09T18:56:51.369864Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 18:56:51.377387 waagent[1480]: 2024-02-09T18:56:51.377346Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 18:56:51.383021 waagent[1480]: 2024-02-09T18:56:51.382927Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 18:56:52.883904 waagent[1480]: 2024-02-09T18:56:52.883749Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 18:56:52.899226 waagent[1480]: 2024-02-09T18:56:52.899152Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 18:56:52.904995 waagent[1480]: 2024-02-09T18:56:52.904930Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 18:56:52.983760 waagent[1480]: 2024-02-09T18:56:52.983626Z INFO Daemon Daemon Found private key matching thumbprint E9FAFC5E973C023EA420D722E432AF2C8533C9BB Feb 9 18:56:52.992727 waagent[1480]: 2024-02-09T18:56:52.992645Z INFO Daemon Daemon Certificate with thumbprint 3E9F7F3F307552C23CC4B8E58240ABB9EB5247E3 has no matching private key. Feb 9 18:56:53.003024 waagent[1480]: 2024-02-09T18:56:53.002949Z INFO Daemon Daemon Fetch goal state completed Feb 9 18:56:55.967042 waagent[1480]: 2024-02-09T18:56:55.966980Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 12898944-9ddd-4e01-a7e7-5d7d7ab6b0dc New eTag: 17288684298573678790] Feb 9 18:56:55.981642 waagent[1480]: 2024-02-09T18:56:55.981557Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:56:56.002604 waagent[1480]: 2024-02-09T18:56:56.002542Z INFO Daemon Daemon Starting provisioning Feb 9 18:56:56.007609 waagent[1480]: 2024-02-09T18:56:56.007538Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 18:56:56.012660 waagent[1480]: 2024-02-09T18:56:56.012598Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-71d57399a1] Feb 9 18:56:56.045552 waagent[1480]: 2024-02-09T18:56:56.045417Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-71d57399a1] Feb 9 18:56:56.056472 waagent[1480]: 2024-02-09T18:56:56.056348Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 18:56:56.063790 waagent[1480]: 2024-02-09T18:56:56.063717Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 18:56:56.080405 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 18:56:56.080567 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 18:56:56.080623 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 18:56:56.080862 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:56:56.086295 systemd-networkd[1248]: eth0: DHCPv6 lease lost Feb 9 18:56:56.087618 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:56:56.087792 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:56:56.089783 systemd[1]: Starting systemd-networkd.service... Feb 9 18:56:56.116852 systemd-networkd[1532]: enP63143s1: Link UP Feb 9 18:56:56.116864 systemd-networkd[1532]: enP63143s1: Gained carrier Feb 9 18:56:56.117808 systemd-networkd[1532]: eth0: Link UP Feb 9 18:56:56.117817 systemd-networkd[1532]: eth0: Gained carrier Feb 9 18:56:56.118118 systemd-networkd[1532]: lo: Link UP Feb 9 18:56:56.118127 systemd-networkd[1532]: lo: Gained carrier Feb 9 18:56:56.118361 systemd-networkd[1532]: eth0: Gained IPv6LL Feb 9 18:56:56.118565 systemd-networkd[1532]: Enumeration completed Feb 9 18:56:56.118672 systemd[1]: Started systemd-networkd.service. Feb 9 18:56:56.120463 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:56:56.124057 waagent[1480]: 2024-02-09T18:56:56.123915Z INFO Daemon Daemon Create user account if not exists Feb 9 18:56:56.130327 waagent[1480]: 2024-02-09T18:56:56.129806Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 18:56:56.130455 systemd-networkd[1532]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:56:56.136497 waagent[1480]: 2024-02-09T18:56:56.136407Z INFO Daemon Daemon Configure sudoer Feb 9 18:56:56.142002 waagent[1480]: 2024-02-09T18:56:56.141918Z INFO Daemon Daemon Configure sshd Feb 9 18:56:56.147293 waagent[1480]: 2024-02-09T18:56:56.147176Z INFO Daemon Daemon Deploy ssh public key. Feb 9 18:56:56.158287 systemd-networkd[1532]: eth0: DHCPv4 address 10.200.20.14/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:56:56.160703 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:56:56.199749 waagent[1480]: 2024-02-09T18:56:56.199624Z INFO Daemon Daemon Decode custom data Feb 9 18:56:56.204752 waagent[1480]: 2024-02-09T18:56:56.204679Z INFO Daemon Daemon Save custom data Feb 9 18:56:57.383432 waagent[1480]: 2024-02-09T18:56:57.383364Z INFO Daemon Daemon Provisioning complete Feb 9 18:56:57.401961 waagent[1480]: 2024-02-09T18:56:57.401899Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 18:56:57.408454 waagent[1480]: 2024-02-09T18:56:57.408388Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 18:56:57.419592 waagent[1480]: 2024-02-09T18:56:57.419525Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 18:56:57.718616 waagent[1541]: 2024-02-09T18:56:57.718524Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 18:56:57.719390 waagent[1541]: 2024-02-09T18:56:57.719334Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:56:57.719525 waagent[1541]: 2024-02-09T18:56:57.719480Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:56:57.732701 waagent[1541]: 2024-02-09T18:56:57.732599Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 18:56:57.732908 waagent[1541]: 2024-02-09T18:56:57.732858Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 18:56:57.803490 waagent[1541]: 2024-02-09T18:56:57.803352Z INFO ExtHandler ExtHandler Found private key matching thumbprint E9FAFC5E973C023EA420D722E432AF2C8533C9BB Feb 9 18:56:57.803700 waagent[1541]: 2024-02-09T18:56:57.803648Z INFO ExtHandler ExtHandler Certificate with thumbprint 3E9F7F3F307552C23CC4B8E58240ABB9EB5247E3 has no matching private key. Feb 9 18:56:57.803914 waagent[1541]: 2024-02-09T18:56:57.803869Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 18:56:58.344188 waagent[1541]: 2024-02-09T18:56:58.344132Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b09fc925-39b2-4bba-b0f9-fbe479f0a1cb New eTag: 17288684298573678790] Feb 9 18:56:58.344929 waagent[1541]: 2024-02-09T18:56:58.344861Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:56:58.525083 waagent[1541]: 2024-02-09T18:56:58.524938Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:56:58.551580 waagent[1541]: 2024-02-09T18:56:58.551490Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1541 Feb 9 18:56:58.555351 waagent[1541]: 2024-02-09T18:56:58.555282Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:56:58.556708 waagent[1541]: 2024-02-09T18:56:58.556652Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:56:58.674653 waagent[1541]: 2024-02-09T18:56:58.674592Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:56:58.675071 waagent[1541]: 2024-02-09T18:56:58.675002Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:56:58.682584 waagent[1541]: 2024-02-09T18:56:58.682517Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:56:58.683136 waagent[1541]: 2024-02-09T18:56:58.683075Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:56:58.684358 waagent[1541]: 2024-02-09T18:56:58.684291Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 18:56:58.685732 waagent[1541]: 2024-02-09T18:56:58.685661Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:56:58.686387 waagent[1541]: 2024-02-09T18:56:58.686328Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:56:58.686646 waagent[1541]: 2024-02-09T18:56:58.686596Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:56:58.687301 waagent[1541]: 2024-02-09T18:56:58.687223Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:56:58.687689 waagent[1541]: 2024-02-09T18:56:58.687635Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:56:58.687689 waagent[1541]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:56:58.687689 waagent[1541]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:56:58.687689 waagent[1541]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:56:58.687689 waagent[1541]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:56:58.687689 waagent[1541]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:56:58.687689 waagent[1541]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:56:58.690087 waagent[1541]: 2024-02-09T18:56:58.689920Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:56:58.690958 waagent[1541]: 2024-02-09T18:56:58.690882Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:56:58.691156 waagent[1541]: 2024-02-09T18:56:58.691099Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:56:58.691762 waagent[1541]: 2024-02-09T18:56:58.691696Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:56:58.691915 waagent[1541]: 2024-02-09T18:56:58.691870Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:56:58.692030 waagent[1541]: 2024-02-09T18:56:58.691987Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:56:58.692962 waagent[1541]: 2024-02-09T18:56:58.692904Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:56:58.693108 waagent[1541]: 2024-02-09T18:56:58.693042Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:56:58.693851 waagent[1541]: 2024-02-09T18:56:58.693763Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:56:58.694036 waagent[1541]: 2024-02-09T18:56:58.693965Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:56:58.694345 waagent[1541]: 2024-02-09T18:56:58.694278Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:56:58.705003 waagent[1541]: 2024-02-09T18:56:58.704932Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 18:56:58.706468 waagent[1541]: 2024-02-09T18:56:58.706408Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:56:58.707588 waagent[1541]: 2024-02-09T18:56:58.707533Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 18:56:58.770828 waagent[1541]: 2024-02-09T18:56:58.770705Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1532' Feb 9 18:56:58.868793 waagent[1541]: 2024-02-09T18:56:58.868676Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:56:58.868793 waagent[1541]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:56:58.868793 waagent[1541]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:56:58.868793 waagent[1541]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:ba:42 brd ff:ff:ff:ff:ff:ff Feb 9 18:56:58.868793 waagent[1541]: 3: enP63143s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:ba:42 brd ff:ff:ff:ff:ff:ff\ altname enP63143p0s2 Feb 9 18:56:58.868793 waagent[1541]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:56:58.868793 waagent[1541]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:56:58.868793 waagent[1541]: 2: eth0 inet 10.200.20.14/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:56:58.868793 waagent[1541]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:56:58.868793 waagent[1541]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:56:58.868793 waagent[1541]: 2: eth0 inet6 fe80::222:48ff:feb6:ba42/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:56:59.252493 waagent[1541]: 2024-02-09T18:56:59.252361Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 18:56:59.255570 waagent[1541]: 2024-02-09T18:56:59.255459Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 18:56:59.255570 waagent[1541]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:56:59.255570 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:56:59.255570 waagent[1541]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:56:59.255570 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:56:59.255570 waagent[1541]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:56:59.255570 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:56:59.255570 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:56:59.255570 waagent[1541]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:56:59.257297 waagent[1541]: 2024-02-09T18:56:59.257229Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 18:57:04.311228 waagent[1541]: 2024-02-09T18:57:04.311163Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 18:57:14.982639 waagent[1541]: 2024-02-09T18:57:14.982575Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 18:57:15.441146 waagent[1480]: 2024-02-09T18:57:15.440996Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 18:57:15.445049 waagent[1480]: 2024-02-09T18:57:15.444999Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 18:57:16.571061 waagent[1581]: 2024-02-09T18:57:16.570959Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 18:57:16.571776 waagent[1581]: 2024-02-09T18:57:16.571712Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 18:57:16.571903 waagent[1581]: 2024-02-09T18:57:16.571859Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 18:57:16.579854 waagent[1581]: 2024-02-09T18:57:16.579731Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:57:16.580240 waagent[1581]: 2024-02-09T18:57:16.580183Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:57:16.580407 waagent[1581]: 2024-02-09T18:57:16.580357Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:57:16.596275 waagent[1581]: 2024-02-09T18:57:16.596183Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 18:57:16.755852 waagent[1581]: 2024-02-09T18:57:16.755781Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 18:57:16.759724 waagent[1581]: 2024-02-09T18:57:16.759658Z INFO ExtHandler Feb 9 18:57:16.759881 waagent[1581]: 2024-02-09T18:57:16.759833Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 56d3269c-8c18-47d9-94c7-f961da0c066b eTag: 17288684298573678790 source: Fabric] Feb 9 18:57:16.760642 waagent[1581]: 2024-02-09T18:57:16.760583Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 18:57:16.761894 waagent[1581]: 2024-02-09T18:57:16.761805Z INFO ExtHandler Feb 9 18:57:16.762039 waagent[1581]: 2024-02-09T18:57:16.761990Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 18:57:16.768835 waagent[1581]: 2024-02-09T18:57:16.768783Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 18:57:16.769359 waagent[1581]: 2024-02-09T18:57:16.769310Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:57:17.945463 waagent[1581]: 2024-02-09T18:57:17.945394Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 18:57:18.017915 waagent[1581]: 2024-02-09T18:57:18.017775Z INFO ExtHandler Downloaded certificate {'thumbprint': 'E9FAFC5E973C023EA420D722E432AF2C8533C9BB', 'hasPrivateKey': True} Feb 9 18:57:18.018988 waagent[1581]: 2024-02-09T18:57:18.018929Z INFO ExtHandler Downloaded certificate {'thumbprint': '3E9F7F3F307552C23CC4B8E58240ABB9EB5247E3', 'hasPrivateKey': False} Feb 9 18:57:18.020072 waagent[1581]: 2024-02-09T18:57:18.020009Z INFO ExtHandler Fetch goal state completed Feb 9 18:57:18.042601 waagent[1581]: 2024-02-09T18:57:18.042511Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1581 Feb 9 18:57:18.046324 waagent[1581]: 2024-02-09T18:57:18.046224Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:57:18.047873 waagent[1581]: 2024-02-09T18:57:18.047813Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:57:18.053032 waagent[1581]: 2024-02-09T18:57:18.052964Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:57:18.053471 waagent[1581]: 2024-02-09T18:57:18.053414Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:57:18.061268 waagent[1581]: 2024-02-09T18:57:18.061172Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:57:18.061782 waagent[1581]: 2024-02-09T18:57:18.061719Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:57:18.108978 waagent[1581]: 2024-02-09T18:57:18.108832Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 18:57:18.112017 waagent[1581]: 2024-02-09T18:57:18.111891Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 18:57:18.115776 waagent[1581]: 2024-02-09T18:57:18.115713Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 18:57:18.117391 waagent[1581]: 2024-02-09T18:57:18.117317Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:57:18.118236 waagent[1581]: 2024-02-09T18:57:18.118172Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:57:18.118532 waagent[1581]: 2024-02-09T18:57:18.118480Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:57:18.119212 waagent[1581]: 2024-02-09T18:57:18.119155Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:57:18.119620 waagent[1581]: 2024-02-09T18:57:18.119565Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:57:18.119620 waagent[1581]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:57:18.119620 waagent[1581]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:57:18.119620 waagent[1581]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:57:18.119620 waagent[1581]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:57:18.119620 waagent[1581]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:57:18.119620 waagent[1581]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:57:18.122166 waagent[1581]: 2024-02-09T18:57:18.122041Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:57:18.122737 waagent[1581]: 2024-02-09T18:57:18.122664Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:57:18.125139 waagent[1581]: 2024-02-09T18:57:18.125034Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:57:18.125834 waagent[1581]: 2024-02-09T18:57:18.125773Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:57:18.126074 waagent[1581]: 2024-02-09T18:57:18.126026Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:57:18.126344 waagent[1581]: 2024-02-09T18:57:18.126275Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:57:18.127207 waagent[1581]: 2024-02-09T18:57:18.126883Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:57:18.128904 waagent[1581]: 2024-02-09T18:57:18.128663Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:57:18.131041 waagent[1581]: 2024-02-09T18:57:18.130954Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:57:18.131174 waagent[1581]: 2024-02-09T18:57:18.131111Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:57:18.134440 waagent[1581]: 2024-02-09T18:57:18.134354Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:57:18.134440 waagent[1581]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:57:18.134440 waagent[1581]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:57:18.134440 waagent[1581]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:ba:42 brd ff:ff:ff:ff:ff:ff Feb 9 18:57:18.134440 waagent[1581]: 3: enP63143s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b6:ba:42 brd ff:ff:ff:ff:ff:ff\ altname enP63143p0s2 Feb 9 18:57:18.134440 waagent[1581]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:57:18.134440 waagent[1581]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:57:18.134440 waagent[1581]: 2: eth0 inet 10.200.20.14/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:57:18.134440 waagent[1581]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:57:18.134440 waagent[1581]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:57:18.134440 waagent[1581]: 2: eth0 inet6 fe80::222:48ff:feb6:ba42/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:57:18.141438 waagent[1581]: 2024-02-09T18:57:18.137465Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:57:18.221756 waagent[1581]: 2024-02-09T18:57:18.221597Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 18:57:18.221756 waagent[1581]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:57:18.221756 waagent[1581]: pkts bytes target prot opt in out source destination Feb 9 18:57:18.221756 waagent[1581]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:57:18.221756 waagent[1581]: pkts bytes target prot opt in out source destination Feb 9 18:57:18.221756 waagent[1581]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:57:18.221756 waagent[1581]: pkts bytes target prot opt in out source destination Feb 9 18:57:18.221756 waagent[1581]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:57:18.221756 waagent[1581]: 159 31508 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:57:18.221756 waagent[1581]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:57:18.322988 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 18:57:18.526661 waagent[1581]: 2024-02-09T18:57:18.526534Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 18:57:18.528533 waagent[1581]: 2024-02-09T18:57:18.528448Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 18:57:20.315373 waagent[1581]: 2024-02-09T18:57:20.315304Z INFO ExtHandler ExtHandler Feb 9 18:57:20.315693 waagent[1581]: 2024-02-09T18:57:20.315487Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: a2443632-92d7-4903-8063-7ca75ff36562 correlation b000114f-dd25-4186-b1e6-ab24d8124c53 created: 2024-02-09T18:55:19.057037Z] Feb 9 18:57:20.316498 waagent[1581]: 2024-02-09T18:57:20.316425Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 18:57:20.318416 waagent[1581]: 2024-02-09T18:57:20.318357Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 18:57:22.684412 waagent[1581]: 2024-02-09T18:57:22.684334Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 18:57:22.694780 waagent[1581]: 2024-02-09T18:57:22.694687Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 3FF26CCE-DC9C-4552-8F0F-243B970F02F7;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 18:57:26.314940 systemd[1]: Created slice system-sshd.slice. Feb 9 18:57:26.316081 systemd[1]: Started sshd@0-10.200.20.14:22-10.200.12.6:33984.service. Feb 9 18:57:26.507972 update_engine[1373]: I0209 18:57:26.507933 1373 update_attempter.cc:509] Updating boot flags... Feb 9 18:57:26.945782 sshd[1620]: Accepted publickey for core from 10.200.12.6 port 33984 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:26.959944 sshd[1620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:26.963206 systemd-logind[1370]: New session 3 of user core. Feb 9 18:57:26.964474 systemd[1]: Started session-3.scope. Feb 9 18:57:27.334459 systemd[1]: Started sshd@1-10.200.20.14:22-10.200.12.6:39282.service. Feb 9 18:57:27.748095 sshd[1691]: Accepted publickey for core from 10.200.12.6 port 39282 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:27.749402 sshd[1691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:27.753086 systemd-logind[1370]: New session 4 of user core. Feb 9 18:57:27.753541 systemd[1]: Started session-4.scope. Feb 9 18:57:28.050870 sshd[1691]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:28.053227 systemd[1]: sshd@1-10.200.20.14:22-10.200.12.6:39282.service: Deactivated successfully. Feb 9 18:57:28.053975 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:57:28.054517 systemd-logind[1370]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:57:28.055457 systemd-logind[1370]: Removed session 4. Feb 9 18:57:28.119968 systemd[1]: Started sshd@2-10.200.20.14:22-10.200.12.6:39294.service. Feb 9 18:57:28.534536 sshd[1697]: Accepted publickey for core from 10.200.12.6 port 39294 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:28.535922 sshd[1697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:28.539927 systemd-logind[1370]: New session 5 of user core. Feb 9 18:57:28.540458 systemd[1]: Started session-5.scope. Feb 9 18:57:28.834192 sshd[1697]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:28.836617 systemd[1]: sshd@2-10.200.20.14:22-10.200.12.6:39294.service: Deactivated successfully. Feb 9 18:57:28.837292 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:57:28.837821 systemd-logind[1370]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:57:28.838644 systemd-logind[1370]: Removed session 5. Feb 9 18:57:28.908591 systemd[1]: Started sshd@3-10.200.20.14:22-10.200.12.6:39300.service. Feb 9 18:57:29.353794 sshd[1703]: Accepted publickey for core from 10.200.12.6 port 39300 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:29.355018 sshd[1703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:29.358725 systemd-logind[1370]: New session 6 of user core. Feb 9 18:57:29.359104 systemd[1]: Started session-6.scope. Feb 9 18:57:29.677868 sshd[1703]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:29.680238 systemd[1]: sshd@3-10.200.20.14:22-10.200.12.6:39300.service: Deactivated successfully. Feb 9 18:57:29.680909 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:57:29.681447 systemd-logind[1370]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:57:29.682221 systemd-logind[1370]: Removed session 6. Feb 9 18:57:29.753287 systemd[1]: Started sshd@4-10.200.20.14:22-10.200.12.6:39306.service. Feb 9 18:57:30.206705 sshd[1709]: Accepted publickey for core from 10.200.12.6 port 39306 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:30.207945 sshd[1709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:30.211658 systemd-logind[1370]: New session 7 of user core. Feb 9 18:57:30.212064 systemd[1]: Started session-7.scope. Feb 9 18:57:30.851915 sudo[1715]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:57:30.852123 sudo[1715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:57:30.878096 dbus-daemon[1354]: avc: received setenforce notice (enforcing=1) Feb 9 18:57:30.878242 sudo[1715]: pam_unix(sudo:session): session closed for user root Feb 9 18:57:30.962864 sshd[1709]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:30.965637 systemd[1]: sshd@4-10.200.20.14:22-10.200.12.6:39306.service: Deactivated successfully. Feb 9 18:57:30.966444 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:57:30.967018 systemd-logind[1370]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:57:30.967872 systemd-logind[1370]: Removed session 7. Feb 9 18:57:31.048555 systemd[1]: Started sshd@5-10.200.20.14:22-10.200.12.6:39314.service. Feb 9 18:57:31.462956 sshd[1719]: Accepted publickey for core from 10.200.12.6 port 39314 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:31.464678 sshd[1719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:31.468747 systemd[1]: Started session-8.scope. Feb 9 18:57:31.469293 systemd-logind[1370]: New session 8 of user core. Feb 9 18:57:31.700913 sudo[1723]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:57:31.701439 sudo[1723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:57:31.703993 sudo[1723]: pam_unix(sudo:session): session closed for user root Feb 9 18:57:31.708118 sudo[1722]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:57:31.708361 sudo[1722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:57:31.716367 systemd[1]: Stopping audit-rules.service... Feb 9 18:57:31.717000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:57:31.718507 auditctl[1726]: No rules Feb 9 18:57:31.723327 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 18:57:31.723402 kernel: audit: type=1305 audit(1707505051.717:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:57:31.718928 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:57:31.719086 systemd[1]: Stopped audit-rules.service. Feb 9 18:57:31.720675 systemd[1]: Starting audit-rules.service... Feb 9 18:57:31.717000 audit[1726]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe9bcdfa0 a2=420 a3=0 items=0 ppid=1 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:31.761856 kernel: audit: type=1300 audit(1707505051.717:173): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe9bcdfa0 a2=420 a3=0 items=0 ppid=1 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:31.717000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:57:31.772983 kernel: audit: type=1327 audit(1707505051.717:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:57:31.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.792954 kernel: audit: type=1131 audit(1707505051.717:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.799609 augenrules[1743]: No rules Feb 9 18:57:31.800540 systemd[1]: Finished audit-rules.service. Feb 9 18:57:31.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.801364 sudo[1722]: pam_unix(sudo:session): session closed for user root Feb 9 18:57:31.801000 audit[1722]: USER_END pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.842396 kernel: audit: type=1130 audit(1707505051.800:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.842458 kernel: audit: type=1106 audit(1707505051.801:176): pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.801000 audit[1722]: CRED_DISP pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.860999 kernel: audit: type=1104 audit(1707505051.801:177): pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.885474 sshd[1719]: pam_unix(sshd:session): session closed for user core Feb 9 18:57:31.886000 audit[1719]: USER_END pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:31.887822 systemd[1]: sshd@5-10.200.20.14:22-10.200.12.6:39314.service: Deactivated successfully. Feb 9 18:57:31.886000 audit[1719]: CRED_DISP pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:31.914783 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 18:57:31.937560 kernel: audit: type=1106 audit(1707505051.886:178): pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:31.937642 kernel: audit: type=1104 audit(1707505051.886:179): pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:31.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.14:22-10.200.12.6:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.937784 systemd-logind[1370]: Session 8 logged out. Waiting for processes to exit. Feb 9 18:57:31.958445 kernel: audit: type=1131 audit(1707505051.887:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.14:22-10.200.12.6:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:31.964270 systemd[1]: Started sshd@6-10.200.20.14:22-10.200.12.6:39318.service. Feb 9 18:57:31.964998 systemd-logind[1370]: Removed session 8. Feb 9 18:57:31.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.14:22-10.200.12.6:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:32.381000 audit[1749]: USER_ACCT pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:32.382338 sshd[1749]: Accepted publickey for core from 10.200.12.6 port 39318 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 18:57:32.383000 audit[1749]: CRED_ACQ pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:32.383000 audit[1749]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffecd626c0 a2=3 a3=1 items=0 ppid=1 pid=1749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:32.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:57:32.383832 sshd[1749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:57:32.387957 systemd[1]: Started session-9.scope. Feb 9 18:57:32.388360 systemd-logind[1370]: New session 9 of user core. Feb 9 18:57:32.392000 audit[1749]: USER_START pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:32.393000 audit[1751]: CRED_ACQ pid=1751 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:57:32.622000 audit[1752]: USER_ACCT pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:32.622750 sudo[1752]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:57:32.622000 audit[1752]: CRED_REFR pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:32.622949 sudo[1752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:57:32.624000 audit[1752]: USER_START pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:57:33.377852 systemd[1]: Starting docker.service... Feb 9 18:57:33.457850 env[1767]: time="2024-02-09T18:57:33.457802582Z" level=info msg="Starting up" Feb 9 18:57:33.466368 env[1767]: time="2024-02-09T18:57:33.466299269Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:57:33.466368 env[1767]: time="2024-02-09T18:57:33.466325429Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:57:33.466368 env[1767]: time="2024-02-09T18:57:33.466343589Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:57:33.466368 env[1767]: time="2024-02-09T18:57:33.466353949Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:57:33.468215 env[1767]: time="2024-02-09T18:57:33.468184382Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 18:57:33.468215 env[1767]: time="2024-02-09T18:57:33.468209862Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 18:57:33.468351 env[1767]: time="2024-02-09T18:57:33.468225661Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 18:57:33.468351 env[1767]: time="2024-02-09T18:57:33.468237821Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 18:57:33.582539 env[1767]: time="2024-02-09T18:57:33.582495619Z" level=info msg="Loading containers: start." Feb 9 18:57:33.698000 audit[1794]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.698000 audit[1794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff3cf33e0 a2=0 a3=1 items=0 ppid=1767 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.698000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 18:57:33.700000 audit[1796]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.700000 audit[1796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff0ca6c60 a2=0 a3=1 items=0 ppid=1767 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 18:57:33.701000 audit[1798]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.701000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc1d670e0 a2=0 a3=1 items=0 ppid=1767 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.701000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:57:33.703000 audit[1800]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.703000 audit[1800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcc645660 a2=0 a3=1 items=0 ppid=1767 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:57:33.705000 audit[1802]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.705000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffded75430 a2=0 a3=1 items=0 ppid=1767 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.705000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 18:57:33.706000 audit[1804]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.706000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce2d3500 a2=0 a3=1 items=0 ppid=1767 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 18:57:33.727000 audit[1806]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.727000 audit[1806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6961a10 a2=0 a3=1 items=0 ppid=1767 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 18:57:33.729000 audit[1808]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.729000 audit[1808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe70743d0 a2=0 a3=1 items=0 ppid=1767 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.729000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 18:57:33.731000 audit[1810]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.731000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffff3a545c0 a2=0 a3=1 items=0 ppid=1767 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.731000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:57:33.758000 audit[1814]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.758000 audit[1814]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc5273530 a2=0 a3=1 items=0 ppid=1767 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:57:33.759000 audit[1815]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.759000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffcc988a10 a2=0 a3=1 items=0 ppid=1767 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:57:33.813269 kernel: Initializing XFRM netlink socket Feb 9 18:57:33.847001 env[1767]: time="2024-02-09T18:57:33.846959595Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 18:57:33.944000 audit[1823]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.944000 audit[1823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd2f63cf0 a2=0 a3=1 items=0 ppid=1767 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 18:57:33.956000 audit[1826]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.956000 audit[1826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffde31cbc0 a2=0 a3=1 items=0 ppid=1767 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 18:57:33.959000 audit[1829]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.959000 audit[1829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd6b16b00 a2=0 a3=1 items=0 ppid=1767 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 18:57:33.961000 audit[1831]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.961000 audit[1831]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe3037040 a2=0 a3=1 items=0 ppid=1767 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 18:57:33.963000 audit[1833]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1833 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.963000 audit[1833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd7387410 a2=0 a3=1 items=0 ppid=1767 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 18:57:33.965000 audit[1835]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.965000 audit[1835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd412bcc0 a2=0 a3=1 items=0 ppid=1767 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 18:57:33.967000 audit[1837]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.967000 audit[1837]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd8a216b0 a2=0 a3=1 items=0 ppid=1767 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.967000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 18:57:33.968000 audit[1839]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.968000 audit[1839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff51ff470 a2=0 a3=1 items=0 ppid=1767 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 18:57:33.970000 audit[1841]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.970000 audit[1841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe3830500 a2=0 a3=1 items=0 ppid=1767 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.970000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 18:57:33.972000 audit[1843]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.972000 audit[1843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffca7d4f20 a2=0 a3=1 items=0 ppid=1767 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 18:57:33.974000 audit[1845]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:33.974000 audit[1845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4fc2270 a2=0 a3=1 items=0 ppid=1767 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:33.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 18:57:33.975287 systemd-networkd[1532]: docker0: Link UP Feb 9 18:57:34.001000 audit[1849]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:34.001000 audit[1849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffeb062390 a2=0 a3=1 items=0 ppid=1767 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:34.001000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:57:34.002000 audit[1850]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:57:34.002000 audit[1850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe5f19250 a2=0 a3=1 items=0 ppid=1767 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:57:34.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 18:57:34.003536 env[1767]: time="2024-02-09T18:57:34.003501470Z" level=info msg="Loading containers: done." Feb 9 18:57:34.012345 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4061687002-merged.mount: Deactivated successfully. Feb 9 18:57:34.083682 env[1767]: time="2024-02-09T18:57:34.083620579Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 18:57:34.083852 env[1767]: time="2024-02-09T18:57:34.083825819Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 18:57:34.083950 env[1767]: time="2024-02-09T18:57:34.083926658Z" level=info msg="Daemon has completed initialization" Feb 9 18:57:34.140579 systemd[1]: Started docker.service. Feb 9 18:57:34.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:34.145985 env[1767]: time="2024-02-09T18:57:34.145920953Z" level=info msg="API listen on /run/docker.sock" Feb 9 18:57:34.161546 systemd[1]: Reloading. Feb 9 18:57:34.225781 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2024-02-09T18:57:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:57:34.225813 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2024-02-09T18:57:34Z" level=info msg="torcx already run" Feb 9 18:57:34.292087 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:57:34.292104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:57:34.308854 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit: BPF prog-id=35 op=LOAD Feb 9 18:57:34.371000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit: BPF prog-id=36 op=LOAD Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.371000 audit: BPF prog-id=37 op=LOAD Feb 9 18:57:34.371000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:57:34.371000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.372000 audit: BPF prog-id=38 op=LOAD Feb 9 18:57:34.372000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:57:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit: BPF prog-id=39 op=LOAD Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit: BPF prog-id=40 op=LOAD Feb 9 18:57:34.373000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:57:34.373000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit: BPF prog-id=41 op=LOAD Feb 9 18:57:34.373000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit: BPF prog-id=42 op=LOAD Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.374000 audit: BPF prog-id=43 op=LOAD Feb 9 18:57:34.374000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:57:34.374000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.375000 audit: BPF prog-id=44 op=LOAD Feb 9 18:57:34.375000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.376000 audit: BPF prog-id=45 op=LOAD Feb 9 18:57:34.376000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit: BPF prog-id=46 op=LOAD Feb 9 18:57:34.377000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit: BPF prog-id=47 op=LOAD Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit: BPF prog-id=48 op=LOAD Feb 9 18:57:34.378000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:57:34.378000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:57:34.378000 audit: BPF prog-id=49 op=LOAD Feb 9 18:57:34.378000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:57:34.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:34.385115 systemd[1]: Started kubelet.service. Feb 9 18:57:34.451151 kubelet[1958]: E0209 18:57:34.451072 1958 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 18:57:34.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:57:34.453303 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:57:34.453421 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:57:39.395808 env[1381]: time="2024-02-09T18:57:39.395762779Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 18:57:40.377572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2099589405.mount: Deactivated successfully. Feb 9 18:57:43.008307 env[1381]: time="2024-02-09T18:57:43.008255385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:43.016490 env[1381]: time="2024-02-09T18:57:43.016442782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:43.022034 env[1381]: time="2024-02-09T18:57:43.021992770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:43.027988 env[1381]: time="2024-02-09T18:57:43.027949332Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:43.028940 env[1381]: time="2024-02-09T18:57:43.028914245Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 9 18:57:43.038635 env[1381]: time="2024-02-09T18:57:43.038599453Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 18:57:44.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.658823 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 18:57:44.659017 systemd[1]: Stopped kubelet.service. Feb 9 18:57:44.660633 systemd[1]: Started kubelet.service. Feb 9 18:57:44.664610 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 9 18:57:44.664712 kernel: audit: type=1130 audit(1707505064.658:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.698405 kernel: audit: type=1131 audit(1707505064.658:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.698521 kernel: audit: type=1130 audit(1707505064.659:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:44.744696 kubelet[1982]: E0209 18:57:44.744642 1982 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 18:57:44.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:57:44.747645 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:57:44.747765 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:57:44.766281 kernel: audit: type=1131 audit(1707505064.746:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:57:45.862480 env[1381]: time="2024-02-09T18:57:45.862425504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:45.874353 env[1381]: time="2024-02-09T18:57:45.874310325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:45.880059 env[1381]: time="2024-02-09T18:57:45.880017988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:45.888628 env[1381]: time="2024-02-09T18:57:45.888576622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:45.889214 env[1381]: time="2024-02-09T18:57:45.889184842Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 9 18:57:45.898413 env[1381]: time="2024-02-09T18:57:45.898378497Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 18:57:47.500941 env[1381]: time="2024-02-09T18:57:47.500896409Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:47.510794 env[1381]: time="2024-02-09T18:57:47.510758548Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:47.519943 env[1381]: time="2024-02-09T18:57:47.519902306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:47.526320 env[1381]: time="2024-02-09T18:57:47.526290060Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:47.527082 env[1381]: time="2024-02-09T18:57:47.527051523Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 9 18:57:47.536020 env[1381]: time="2024-02-09T18:57:47.535983034Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 18:57:48.775009 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3404475112.mount: Deactivated successfully. Feb 9 18:57:49.460160 env[1381]: time="2024-02-09T18:57:49.460112995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:49.471322 env[1381]: time="2024-02-09T18:57:49.471283716Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:49.477733 env[1381]: time="2024-02-09T18:57:49.477685220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:49.483043 env[1381]: time="2024-02-09T18:57:49.482998893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:49.483444 env[1381]: time="2024-02-09T18:57:49.483413745Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 18:57:49.492179 env[1381]: time="2024-02-09T18:57:49.492142236Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 18:57:50.193807 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount289834079.mount: Deactivated successfully. Feb 9 18:57:50.230760 env[1381]: time="2024-02-09T18:57:50.230715334Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:50.240499 env[1381]: time="2024-02-09T18:57:50.240461446Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:50.250099 env[1381]: time="2024-02-09T18:57:50.249999873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:50.259369 env[1381]: time="2024-02-09T18:57:50.259331534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:50.259953 env[1381]: time="2024-02-09T18:57:50.259927431Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 9 18:57:50.268585 env[1381]: time="2024-02-09T18:57:50.268540632Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 18:57:51.206470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1262240095.mount: Deactivated successfully. Feb 9 18:57:54.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:54.908805 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 9 18:57:54.946363 kernel: audit: type=1130 audit(1707505074.907:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:54.946401 kernel: audit: type=1131 audit(1707505074.907:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:54.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:54.908976 systemd[1]: Stopped kubelet.service. Feb 9 18:57:54.936644 systemd[1]: Started kubelet.service. Feb 9 18:57:54.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:54.968053 kernel: audit: type=1130 audit(1707505074.935:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:57:55.023930 kubelet[2009]: E0209 18:57:55.023860 2009 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 18:57:55.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:57:55.026058 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:57:55.026176 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:57:55.045271 kernel: audit: type=1131 audit(1707505075.025:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:57:55.934432 env[1381]: time="2024-02-09T18:57:55.934385646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:55.946338 env[1381]: time="2024-02-09T18:57:55.946300537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:55.955135 env[1381]: time="2024-02-09T18:57:55.955088993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:55.962596 env[1381]: time="2024-02-09T18:57:55.962552495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:55.963363 env[1381]: time="2024-02-09T18:57:55.963336515Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 9 18:57:55.972471 env[1381]: time="2024-02-09T18:57:55.972432177Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 18:57:56.850428 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1552206028.mount: Deactivated successfully. Feb 9 18:57:57.329295 env[1381]: time="2024-02-09T18:57:57.329228169Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:57.343227 env[1381]: time="2024-02-09T18:57:57.343172454Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:57.350905 env[1381]: time="2024-02-09T18:57:57.350868833Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:57.360270 env[1381]: time="2024-02-09T18:57:57.360218010Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:57:57.360702 env[1381]: time="2024-02-09T18:57:57.360672980Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 9 18:58:01.781489 systemd[1]: Stopped kubelet.service. Feb 9 18:58:01.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:01.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:01.817318 kernel: audit: type=1130 audit(1707505081.780:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:01.817391 kernel: audit: type=1131 audit(1707505081.780:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:01.827219 systemd[1]: Reloading. Feb 9 18:58:01.895423 /usr/lib/systemd/system-generators/torcx-generator[2098]: time="2024-02-09T18:58:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:58:01.895453 /usr/lib/systemd/system-generators/torcx-generator[2098]: time="2024-02-09T18:58:01Z" level=info msg="torcx already run" Feb 9 18:58:01.982654 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:58:01.982819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:58:02.000161 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.107048 kernel: audit: type=1400 audit(1707505082.069:399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.107207 kernel: audit: type=1400 audit(1707505082.069:400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.107310 kernel: audit: type=1400 audit(1707505082.069:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.125290 kernel: audit: type=1400 audit(1707505082.069:402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.166900 kernel: audit: type=1400 audit(1707505082.069:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.167007 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:58:02.167039 kernel: audit: type=1400 audit(1707505082.069:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.167065 kernel: audit: type=1400 audit(1707505082.069:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit: BPF prog-id=50 op=LOAD Feb 9 18:58:02.088000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit: BPF prog-id=51 op=LOAD Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.088000 audit: BPF prog-id=52 op=LOAD Feb 9 18:58:02.088000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:58:02.088000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit: BPF prog-id=53 op=LOAD Feb 9 18:58:02.106000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit: BPF prog-id=54 op=LOAD Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.141000 audit: BPF prog-id=55 op=LOAD Feb 9 18:58:02.141000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:58:02.141000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:58:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.205000 audit: BPF prog-id=59 op=LOAD Feb 9 18:58:02.205000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.207000 audit: BPF prog-id=60 op=LOAD Feb 9 18:58:02.207000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit: BPF prog-id=61 op=LOAD Feb 9 18:58:02.209000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.209000 audit: BPF prog-id=62 op=LOAD Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.210000 audit: BPF prog-id=63 op=LOAD Feb 9 18:58:02.210000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:58:02.210000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.212000 audit: BPF prog-id=64 op=LOAD Feb 9 18:58:02.212000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:58:02.238343 systemd[1]: Started kubelet.service. Feb 9 18:58:02.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:02.292935 kubelet[2159]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:58:02.292935 kubelet[2159]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:58:02.293230 kubelet[2159]: I0209 18:58:02.292990 2159 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:58:02.294210 kubelet[2159]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:58:02.294210 kubelet[2159]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:58:02.805225 kubelet[2159]: I0209 18:58:02.805195 2159 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 18:58:02.805448 kubelet[2159]: I0209 18:58:02.805437 2159 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:58:02.805704 kubelet[2159]: I0209 18:58:02.805690 2159 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 18:58:02.808700 kubelet[2159]: E0209 18:58:02.808662 2159 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.808780 kubelet[2159]: I0209 18:58:02.808709 2159 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:58:02.810621 kubelet[2159]: W0209 18:58:02.810605 2159 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:58:02.811178 kubelet[2159]: I0209 18:58:02.811163 2159 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:58:02.811472 kubelet[2159]: I0209 18:58:02.811460 2159 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:58:02.811604 kubelet[2159]: I0209 18:58:02.811591 2159 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:58:02.811733 kubelet[2159]: I0209 18:58:02.811721 2159 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:58:02.811795 kubelet[2159]: I0209 18:58:02.811787 2159 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 18:58:02.811942 kubelet[2159]: I0209 18:58:02.811931 2159 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:58:02.814890 kubelet[2159]: I0209 18:58:02.814861 2159 kubelet.go:398] "Attempting to sync node with API server" Feb 9 18:58:02.814890 kubelet[2159]: I0209 18:58:02.814888 2159 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:58:02.815449 kubelet[2159]: W0209 18:58:02.815409 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-71d57399a1&limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.815512 kubelet[2159]: E0209 18:58:02.815459 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-71d57399a1&limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.815512 kubelet[2159]: I0209 18:58:02.815504 2159 kubelet.go:297] "Adding apiserver pod source" Feb 9 18:58:02.815561 kubelet[2159]: I0209 18:58:02.815517 2159 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:58:02.816093 kubelet[2159]: W0209 18:58:02.815973 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.816093 kubelet[2159]: E0209 18:58:02.816010 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.816188 kubelet[2159]: I0209 18:58:02.816146 2159 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:58:02.816451 kubelet[2159]: W0209 18:58:02.816426 2159 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:58:02.816787 kubelet[2159]: I0209 18:58:02.816757 2159 server.go:1186] "Started kubelet" Feb 9 18:58:02.816000 audit[2159]: AVC avc: denied { mac_admin } for pid=2159 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.816000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:02.816000 audit[2159]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400096ddd0 a1=4000c7a870 a2=400096dda0 a3=25 items=0 ppid=1 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.816000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:02.816000 audit[2159]: AVC avc: denied { mac_admin } for pid=2159 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:02.816000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:02.816000 audit[2159]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008edc40 a1=4000c7a888 a2=400096de60 a3=25 items=0 ppid=1 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.816000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:02.818515 kubelet[2159]: I0209 18:58:02.818205 2159 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:58:02.818515 kubelet[2159]: I0209 18:58:02.818264 2159 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:58:02.818515 kubelet[2159]: I0209 18:58:02.818325 2159 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:58:02.821099 kubelet[2159]: E0209 18:58:02.821083 2159 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:58:02.821212 kubelet[2159]: E0209 18:58:02.821202 2159 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:58:02.821584 kubelet[2159]: E0209 18:58:02.821501 2159 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-71d57399a1.17b246d37977378c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-71d57399a1", UID:"ci-3510.3.2-a-71d57399a1", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-71d57399a1"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 58, 2, 816739212, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 58, 2, 816739212, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.14:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.14:6443: connect: connection refused'(may retry after sleeping) Feb 9 18:58:02.823645 kubelet[2159]: I0209 18:58:02.823625 2159 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:58:02.822000 audit[2170]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.822000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffec58ba60 a2=0 a3=1 items=0 ppid=2159 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.822000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:58:02.824090 kubelet[2159]: I0209 18:58:02.824074 2159 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 18:58:02.824522 kubelet[2159]: I0209 18:58:02.824501 2159 server.go:451] "Adding debug handlers to kubelet server" Feb 9 18:58:02.823000 audit[2171]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.823000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdba64820 a2=0 a3=1 items=0 ppid=2159 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:58:02.825380 kubelet[2159]: I0209 18:58:02.825354 2159 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:58:02.827666 kubelet[2159]: E0209 18:58:02.827642 2159 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.828621 kubelet[2159]: W0209 18:58:02.828581 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.828737 kubelet[2159]: E0209 18:58:02.828725 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:02.827000 audit[2173]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.827000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc6d72490 a2=0 a3=1 items=0 ppid=2159 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.827000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:58:02.832000 audit[2175]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.832000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc1bc1480 a2=0 a3=1 items=0 ppid=2159 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:58:02.864000 audit[2181]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.864000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff88917a0 a2=0 a3=1 items=0 ppid=2159 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:58:02.865000 audit[2183]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:02.865000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcc98ddc0 a2=0 a3=1 items=0 ppid=2159 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:02.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 18:58:03.029134 kubelet[2159]: E0209 18:58:03.029090 2159 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.064000 audit[2186]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.064000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffee592c90 a2=0 a3=1 items=0 ppid=2159 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 18:58:03.101000 audit[2189]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.101000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc96745c0 a2=0 a3=1 items=0 ppid=2159 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 18:58:03.103000 audit[2190]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.103000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc28abd50 a2=0 a3=1 items=0 ppid=2159 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 18:58:03.104000 audit[2191]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.104000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcad04780 a2=0 a3=1 items=0 ppid=2159 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.104000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:58:03.106000 audit[2193]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.106000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcedb1e10 a2=0 a3=1 items=0 ppid=2159 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 18:58:03.108000 audit[2195]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.108000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffffec6a510 a2=0 a3=1 items=0 ppid=2159 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:58:03.110000 audit[2197]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.110000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc00d9a90 a2=0 a3=1 items=0 ppid=2159 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 18:58:03.112000 audit[2199]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.112000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff4351550 a2=0 a3=1 items=0 ppid=2159 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 18:58:03.114000 audit[2201]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.114000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=fffff0348bd0 a2=0 a3=1 items=0 ppid=2159 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 18:58:03.116061 kubelet[2159]: I0209 18:58:03.116041 2159 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:58:03.115000 audit[2202]: NETFILTER_CFG table=mangle:45 family=10 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.115000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce24a930 a2=0 a3=1 items=0 ppid=2159 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.115000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:58:03.115000 audit[2203]: NETFILTER_CFG table=mangle:46 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.115000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecec2ea0 a2=0 a3=1 items=0 ppid=2159 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:58:03.116000 audit[2204]: NETFILTER_CFG table=nat:47 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.116000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddcd6150 a2=0 a3=1 items=0 ppid=2159 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:58:03.117000 audit[2205]: NETFILTER_CFG table=nat:48 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.117000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffffb7180d0 a2=0 a3=1 items=0 ppid=2159 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.117000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 18:58:03.117000 audit[2206]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:03.117000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed9b3d40 a2=0 a3=1 items=0 ppid=2159 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:58:03.119000 audit[2208]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.119000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe9806670 a2=0 a3=1 items=0 ppid=2159 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 18:58:03.120000 audit[2209]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.120000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffbd92680 a2=0 a3=1 items=0 ppid=2159 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.120000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:58:03.122000 audit[2211]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.122000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=fffff4e9ac60 a2=0 a3=1 items=0 ppid=2159 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 18:58:03.123000 audit[2212]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.123000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc9911a50 a2=0 a3=1 items=0 ppid=2159 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 18:58:03.124000 audit[2213]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.124000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca518b10 a2=0 a3=1 items=0 ppid=2159 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:58:03.125000 audit[2215]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.125000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe90ebaa0 a2=0 a3=1 items=0 ppid=2159 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 18:58:03.127000 audit[2217]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.127000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffce7fd4e0 a2=0 a3=1 items=0 ppid=2159 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:58:03.129000 audit[2219]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.129000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff5a81360 a2=0 a3=1 items=0 ppid=2159 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 18:58:03.131000 audit[2221]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.131000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff56e9400 a2=0 a3=1 items=0 ppid=2159 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.131000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 18:58:03.133939 kubelet[2159]: I0209 18:58:03.133914 2159 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.134358 kubelet[2159]: E0209 18:58:03.134337 2159 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.14:6443/api/v1/nodes\": dial tcp 10.200.20.14:6443: connect: connection refused" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.135058 kubelet[2159]: I0209 18:58:03.135041 2159 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:58:03.135058 kubelet[2159]: I0209 18:58:03.135058 2159 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:58:03.135138 kubelet[2159]: I0209 18:58:03.135075 2159 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:58:03.145972 kubelet[2159]: I0209 18:58:03.145933 2159 policy_none.go:49] "None policy: Start" Feb 9 18:58:03.146718 kubelet[2159]: I0209 18:58:03.146702 2159 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:58:03.146765 kubelet[2159]: I0209 18:58:03.146731 2159 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:58:03.158896 systemd[1]: Created slice kubepods.slice. Feb 9 18:58:03.162973 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:58:03.167488 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:58:03.169457 kubelet[2159]: I0209 18:58:03.169439 2159 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:58:03.168000 audit[2159]: AVC avc: denied { mac_admin } for pid=2159 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:03.168000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:03.168000 audit[2159]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f1a9c0 a1=4000ada108 a2=4000f1a990 a3=25 items=0 ppid=1 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.168000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:03.169837 kubelet[2159]: I0209 18:58:03.169824 2159 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:58:03.170126 kubelet[2159]: I0209 18:58:03.170113 2159 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:58:03.170903 kubelet[2159]: E0209 18:58:03.170890 2159 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-71d57399a1\" not found" Feb 9 18:58:03.170000 audit[2223]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.170000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffd924dd10 a2=0 a3=1 items=0 ppid=2159 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 18:58:03.171747 kubelet[2159]: I0209 18:58:03.171733 2159 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:58:03.171839 kubelet[2159]: I0209 18:58:03.171829 2159 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 18:58:03.172047 kubelet[2159]: I0209 18:58:03.172034 2159 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 18:58:03.172195 kubelet[2159]: E0209 18:58:03.172185 2159 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 18:58:03.171000 audit[2224]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.173039 kubelet[2159]: W0209 18:58:03.173003 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.173143 kubelet[2159]: E0209 18:58:03.173133 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.171000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfaedf80 a2=0 a3=1 items=0 ppid=2159 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:58:03.172000 audit[2225]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.172000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5409b10 a2=0 a3=1 items=0 ppid=2159 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:58:03.173000 audit[2226]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:03.173000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7553fa0 a2=0 a3=1 items=0 ppid=2159 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:03.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:58:03.273339 kubelet[2159]: I0209 18:58:03.273296 2159 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:03.274699 kubelet[2159]: I0209 18:58:03.274679 2159 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:03.276854 kubelet[2159]: I0209 18:58:03.276817 2159 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:03.277058 kubelet[2159]: I0209 18:58:03.277045 2159 status_manager.go:698] "Failed to get status for pod" podUID=d43e386a31bdd5995ce9402882d38106 pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" err="Get \"https://10.200.20.14:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-71d57399a1\": dial tcp 10.200.20.14:6443: connect: connection refused" Feb 9 18:58:03.278058 kubelet[2159]: I0209 18:58:03.278037 2159 status_manager.go:698] "Failed to get status for pod" podUID=1c2bdbf83a05c72ea9a445924232a63f pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" err="Get \"https://10.200.20.14:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-71d57399a1\": dial tcp 10.200.20.14:6443: connect: connection refused" Feb 9 18:58:03.280013 kubelet[2159]: I0209 18:58:03.279997 2159 status_manager.go:698] "Failed to get status for pod" podUID=ad7577b68aa5aa1e0c4370625c27bfcf pod="kube-system/kube-scheduler-ci-3510.3.2-a-71d57399a1" err="Get \"https://10.200.20.14:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-71d57399a1\": dial tcp 10.200.20.14:6443: connect: connection refused" Feb 9 18:58:03.281669 systemd[1]: Created slice kubepods-burstable-podd43e386a31bdd5995ce9402882d38106.slice. Feb 9 18:58:03.293167 systemd[1]: Created slice kubepods-burstable-pod1c2bdbf83a05c72ea9a445924232a63f.slice. Feb 9 18:58:03.304356 systemd[1]: Created slice kubepods-burstable-podad7577b68aa5aa1e0c4370625c27bfcf.slice. Feb 9 18:58:03.327879 kubelet[2159]: I0209 18:58:03.327794 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.329315 kubelet[2159]: I0209 18:58:03.329273 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.329623 kubelet[2159]: I0209 18:58:03.329611 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.329859 kubelet[2159]: I0209 18:58:03.329848 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.329974 kubelet[2159]: I0209 18:58:03.329964 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.330086 kubelet[2159]: I0209 18:58:03.330076 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.330196 kubelet[2159]: I0209 18:58:03.330186 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.330315 kubelet[2159]: I0209 18:58:03.330306 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.330419 kubelet[2159]: I0209 18:58:03.330410 2159 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad7577b68aa5aa1e0c4370625c27bfcf-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-71d57399a1\" (UID: \"ad7577b68aa5aa1e0c4370625c27bfcf\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.336433 kubelet[2159]: I0209 18:58:03.336401 2159 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.336952 kubelet[2159]: E0209 18:58:03.336937 2159 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.14:6443/api/v1/nodes\": dial tcp 10.200.20.14:6443: connect: connection refused" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.429582 kubelet[2159]: E0209 18:58:03.429537 2159 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.592500 env[1381]: time="2024-02-09T18:58:03.592404178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-71d57399a1,Uid:d43e386a31bdd5995ce9402882d38106,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:03.603955 env[1381]: time="2024-02-09T18:58:03.603915407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-71d57399a1,Uid:1c2bdbf83a05c72ea9a445924232a63f,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:03.607012 env[1381]: time="2024-02-09T18:58:03.606979148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-71d57399a1,Uid:ad7577b68aa5aa1e0c4370625c27bfcf,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:03.654903 kubelet[2159]: W0209 18:58:03.654854 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-71d57399a1&limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.655049 kubelet[2159]: E0209 18:58:03.655038 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-71d57399a1&limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.738944 kubelet[2159]: I0209 18:58:03.738912 2159 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.739234 kubelet[2159]: E0209 18:58:03.739211 2159 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.14:6443/api/v1/nodes\": dial tcp 10.200.20.14:6443: connect: connection refused" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:03.799854 kubelet[2159]: W0209 18:58:03.799798 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:03.799854 kubelet[2159]: E0209 18:58:03.799857 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.230847 kubelet[2159]: E0209 18:58:04.230803 2159 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.347997 kubelet[2159]: W0209 18:58:04.347943 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.347997 kubelet[2159]: E0209 18:58:04.348003 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.349828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2971096976.mount: Deactivated successfully. Feb 9 18:58:04.406625 env[1381]: time="2024-02-09T18:58:04.406579578Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.413382 env[1381]: time="2024-02-09T18:58:04.413346269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.430716 kubelet[2159]: W0209 18:58:04.430683 2159 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.430716 kubelet[2159]: E0209 18:58:04.430720 2159 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.437905 env[1381]: time="2024-02-09T18:58:04.437861226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.444839 env[1381]: time="2024-02-09T18:58:04.444804361Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.455330 env[1381]: time="2024-02-09T18:58:04.455290245Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.461405 env[1381]: time="2024-02-09T18:58:04.461376124Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.470546 env[1381]: time="2024-02-09T18:58:04.470505821Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.475575 env[1381]: time="2024-02-09T18:58:04.475545399Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.485508 env[1381]: time="2024-02-09T18:58:04.485419671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.495952 env[1381]: time="2024-02-09T18:58:04.495909395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.517655 env[1381]: time="2024-02-09T18:58:04.517616178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.538520 env[1381]: time="2024-02-09T18:58:04.538464223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:04.541915 kubelet[2159]: I0209 18:58:04.541580 2159 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:04.541915 kubelet[2159]: E0209 18:58:04.541882 2159 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.14:6443/api/v1/nodes\": dial tcp 10.200.20.14:6443: connect: connection refused" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:04.628064 env[1381]: time="2024-02-09T18:58:04.627998405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:04.628411 env[1381]: time="2024-02-09T18:58:04.628386213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:04.628507 env[1381]: time="2024-02-09T18:58:04.628486934Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:04.628751 env[1381]: time="2024-02-09T18:58:04.628708139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7c72bd80c20774f7e9a0e0f74d452dac2d0f7164bf40844b4344ea16e071dbd3 pid=2235 runtime=io.containerd.runc.v2 Feb 9 18:58:04.644622 systemd[1]: Started cri-containerd-7c72bd80c20774f7e9a0e0f74d452dac2d0f7164bf40844b4344ea16e071dbd3.scope. Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.655000 audit: BPF prog-id=65 op=LOAD Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2235 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373262643830633230373734663765396130653066373464343532 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2235 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373262643830633230373734663765396130653066373464343532 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit: BPF prog-id=66 op=LOAD Feb 9 18:58:04.656000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2235 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373262643830633230373734663765396130653066373464343532 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit: BPF prog-id=67 op=LOAD Feb 9 18:58:04.656000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2235 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373262643830633230373734663765396130653066373464343532 Feb 9 18:58:04.656000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:58:04.656000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.656000 audit: BPF prog-id=68 op=LOAD Feb 9 18:58:04.656000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2235 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373262643830633230373734663765396130653066373464343532 Feb 9 18:58:04.662319 env[1381]: time="2024-02-09T18:58:04.661705941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:04.662319 env[1381]: time="2024-02-09T18:58:04.661765942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:04.662319 env[1381]: time="2024-02-09T18:58:04.661776742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:04.662319 env[1381]: time="2024-02-09T18:58:04.661884464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd pid=2271 runtime=io.containerd.runc.v2 Feb 9 18:58:04.678926 env[1381]: time="2024-02-09T18:58:04.678880595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-71d57399a1,Uid:d43e386a31bdd5995ce9402882d38106,Namespace:kube-system,Attempt:0,} returns sandbox id \"7c72bd80c20774f7e9a0e0f74d452dac2d0f7164bf40844b4344ea16e071dbd3\"" Feb 9 18:58:04.683151 env[1381]: time="2024-02-09T18:58:04.683109157Z" level=info msg="CreateContainer within sandbox \"7c72bd80c20774f7e9a0e0f74d452dac2d0f7164bf40844b4344ea16e071dbd3\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 18:58:04.687267 env[1381]: time="2024-02-09T18:58:04.687187276Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:04.687380 env[1381]: time="2024-02-09T18:58:04.687272798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:04.687380 env[1381]: time="2024-02-09T18:58:04.687299079Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:04.687472 env[1381]: time="2024-02-09T18:58:04.687437521Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28 pid=2297 runtime=io.containerd.runc.v2 Feb 9 18:58:04.691671 systemd[1]: Started cri-containerd-f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd.scope. Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.708000 audit: BPF prog-id=69 op=LOAD Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633336162653837303766666264663231333966383133323039636330 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633336162653837303766666264663231333966383133323039636330 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.709000 audit: BPF prog-id=70 op=LOAD Feb 9 18:58:04.709000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633336162653837303766666264663231333966383133323039636330 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.710000 audit: BPF prog-id=71 op=LOAD Feb 9 18:58:04.710000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633336162653837303766666264663231333966383133323039636330 Feb 9 18:58:04.711000 audit: BPF prog-id=71 op=UNLOAD Feb 9 18:58:04.711000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { perfmon } for pid=2281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit[2281]: AVC avc: denied { bpf } for pid=2281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.711000 audit: BPF prog-id=72 op=LOAD Feb 9 18:58:04.711000 audit[2281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2271 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633336162653837303766666264663231333966383133323039636330 Feb 9 18:58:04.734333 systemd[1]: Started cri-containerd-9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28.scope. Feb 9 18:58:04.742308 env[1381]: time="2024-02-09T18:58:04.742229347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-71d57399a1,Uid:ad7577b68aa5aa1e0c4370625c27bfcf,Namespace:kube-system,Attempt:0,} returns sandbox id \"f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd\"" Feb 9 18:58:04.745524 env[1381]: time="2024-02-09T18:58:04.745474130Z" level=info msg="CreateContainer within sandbox \"f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 18:58:04.754701 env[1381]: time="2024-02-09T18:58:04.754554507Z" level=info msg="CreateContainer within sandbox \"7c72bd80c20774f7e9a0e0f74d452dac2d0f7164bf40844b4344ea16e071dbd3\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d12695b6b0513bd65b1689fe231b3cd053fdf40616fcaf3438d4acc83ce379af\"" Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.755000 audit: BPF prog-id=73 op=LOAD Feb 9 18:58:04.756919 env[1381]: time="2024-02-09T18:58:04.755508685Z" level=info msg="StartContainer for \"d12695b6b0513bd65b1689fe231b3cd053fdf40616fcaf3438d4acc83ce379af\"" Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2297 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637336434343761663466343333316162366666316631616461 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2297 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637336434343761663466343333316162366666316631616461 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.756000 audit: BPF prog-id=74 op=LOAD Feb 9 18:58:04.756000 audit[2319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2297 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637336434343761663466343333316162366666316631616461 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit: BPF prog-id=75 op=LOAD Feb 9 18:58:04.757000 audit[2319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2297 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637336434343761663466343333316162366666316631616461 Feb 9 18:58:04.757000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:58:04.757000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { perfmon } for pid=2319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit[2319]: AVC avc: denied { bpf } for pid=2319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.757000 audit: BPF prog-id=76 op=LOAD Feb 9 18:58:04.757000 audit[2319]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2297 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637336434343761663466343333316162366666316631616461 Feb 9 18:58:04.778140 systemd[1]: Started cri-containerd-d12695b6b0513bd65b1689fe231b3cd053fdf40616fcaf3438d4acc83ce379af.scope. Feb 9 18:58:04.784303 env[1381]: time="2024-02-09T18:58:04.783034661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-71d57399a1,Uid:1c2bdbf83a05c72ea9a445924232a63f,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28\"" Feb 9 18:58:04.789317 env[1381]: time="2024-02-09T18:58:04.789273942Z" level=info msg="CreateContainer within sandbox \"9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.799000 audit: BPF prog-id=77 op=LOAD Feb 9 18:58:04.799000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.799000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323639356236623035313362643635623136383966653233316233 Feb 9 18:58:04.799000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.799000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323639356236623035313362643635623136383966653233316233 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit: BPF prog-id=78 op=LOAD Feb 9 18:58:04.800000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323639356236623035313362643635623136383966653233316233 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.800000 audit: BPF prog-id=79 op=LOAD Feb 9 18:58:04.800000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.800000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323639356236623035313362643635623136383966653233316233 Feb 9 18:58:04.801000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:58:04.801000 audit: BPF prog-id=78 op=UNLOAD Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { perfmon } for pid=2350 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit[2350]: AVC avc: denied { bpf } for pid=2350 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.801000 audit: BPF prog-id=80 op=LOAD Feb 9 18:58:04.801000 audit[2350]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2235 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323639356236623035313362643635623136383966653233316233 Feb 9 18:58:04.824481 env[1381]: time="2024-02-09T18:58:04.824416506Z" level=info msg="CreateContainer within sandbox \"f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500\"" Feb 9 18:58:04.827003 env[1381]: time="2024-02-09T18:58:04.826948435Z" level=info msg="StartContainer for \"d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500\"" Feb 9 18:58:04.838166 env[1381]: time="2024-02-09T18:58:04.838104532Z" level=info msg="StartContainer for \"d12695b6b0513bd65b1689fe231b3cd053fdf40616fcaf3438d4acc83ce379af\" returns successfully" Feb 9 18:58:04.849276 systemd[1]: Started cri-containerd-d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500.scope. Feb 9 18:58:04.870460 env[1381]: time="2024-02-09T18:58:04.870406241Z" level=info msg="CreateContainer within sandbox \"9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750\"" Feb 9 18:58:04.872995 env[1381]: time="2024-02-09T18:58:04.872449200Z" level=info msg="StartContainer for \"40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750\"" Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.871000 audit: BPF prog-id=81 op=LOAD Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2271 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432626335643632633064323430373362623463393264323430653562 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2271 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432626335643632633064323430373362623463393264323430653562 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit: BPF prog-id=82 op=LOAD Feb 9 18:58:04.872000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2271 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432626335643632633064323430373362623463393264323430653562 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.872000 audit: BPF prog-id=83 op=LOAD Feb 9 18:58:04.872000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2271 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432626335643632633064323430373362623463393264323430653562 Feb 9 18:58:04.873000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:58:04.873000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.873000 audit: BPF prog-id=84 op=LOAD Feb 9 18:58:04.873000 audit[2395]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2271 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432626335643632633064323430373362623463393264323430653562 Feb 9 18:58:04.887647 kubelet[2159]: E0209 18:58:04.887615 2159 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.14:6443: connect: connection refused Feb 9 18:58:04.902520 systemd[1]: Started cri-containerd-40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750.scope. Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.928000 audit: BPF prog-id=85 op=LOAD Feb 9 18:58:04.929000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.929000 audit[2420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2297 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363536623232656266326633613161303561313730306566313536 Feb 9 18:58:04.929000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.929000 audit[2420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2297 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363536623232656266326633613161303561313730306566313536 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit: BPF prog-id=86 op=LOAD Feb 9 18:58:04.930000 audit[2420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2297 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363536623232656266326633613161303561313730306566313536 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.930000 audit: BPF prog-id=87 op=LOAD Feb 9 18:58:04.930000 audit[2420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2297 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363536623232656266326633613161303561313730306566313536 Feb 9 18:58:04.931000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:58:04.931000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:04.931000 audit: BPF prog-id=88 op=LOAD Feb 9 18:58:04.931000 audit[2420]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2297 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:04.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430363536623232656266326633613161303561313730306566313536 Feb 9 18:58:04.943419 env[1381]: time="2024-02-09T18:58:04.943369260Z" level=info msg="StartContainer for \"d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500\" returns successfully" Feb 9 18:58:04.978199 env[1381]: time="2024-02-09T18:58:04.978150977Z" level=info msg="StartContainer for \"40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750\" returns successfully" Feb 9 18:58:06.144025 kubelet[2159]: I0209 18:58:06.143986 2159 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:07.511000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:07.518288 kernel: kauditd_printk_skb: 678 callbacks suppressed Feb 9 18:58:07.518422 kernel: audit: type=1400 audit(1707505087.511:686): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:07.511000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40002e29f0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:07.577003 kernel: audit: type=1300 audit(1707505087.511:686): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40002e29f0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:07.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:07.606339 kernel: audit: type=1327 audit(1707505087.511:686): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:07.606486 kernel: audit: type=1400 audit(1707505087.511:687): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:07.511000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:07.511000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001026040 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:07.661044 kernel: audit: type=1300 audit(1707505087.511:687): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001026040 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:07.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:07.686376 kernel: audit: type=1327 audit(1707505087.511:687): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:08.238000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.240000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.312798 kernel: audit: type=1400 audit(1707505088.238:688): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.312916 kernel: audit: type=1400 audit(1707505088.240:689): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.240000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=40044938c0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.351514 kernel: audit: type=1300 audit(1707505088.240:689): arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=40044938c0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.376892 kernel: audit: type=1327 audit(1707505088.240:689): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.248000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.248000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=52 a1=4004556ab0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.248000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.249000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.249000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=53 a1=40009120c0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.238000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40044d4090 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.238000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.289000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.289000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4002a7e440 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.289000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:08.289000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4004599860 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:58:08.289000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:58:08.508439 kubelet[2159]: I0209 18:58:08.508336 2159 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:08.819203 kubelet[2159]: I0209 18:58:08.819096 2159 apiserver.go:52] "Watching apiserver" Feb 9 18:58:08.826469 kubelet[2159]: I0209 18:58:08.826407 2159 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:58:08.898816 kubelet[2159]: I0209 18:58:08.898773 2159 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:58:09.158068 kubelet[2159]: E0209 18:58:09.157746 2159 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.187000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 18:58:11.187000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f86340 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:11.187000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:11.352525 systemd[1]: Reloading. Feb 9 18:58:11.425100 /usr/lib/systemd/system-generators/torcx-generator[2488]: time="2024-02-09T18:58:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:58:11.425644 /usr/lib/systemd/system-generators/torcx-generator[2488]: time="2024-02-09T18:58:11Z" level=info msg="torcx already run" Feb 9 18:58:11.493514 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:58:11.493533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:58:11.512207 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit: BPF prog-id=89 op=LOAD Feb 9 18:58:11.592000 audit: BPF prog-id=50 op=UNLOAD Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit: BPF prog-id=90 op=LOAD Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.592000 audit: BPF prog-id=91 op=LOAD Feb 9 18:58:11.592000 audit: BPF prog-id=51 op=UNLOAD Feb 9 18:58:11.592000 audit: BPF prog-id=52 op=UNLOAD Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit: BPF prog-id=92 op=LOAD Feb 9 18:58:11.593000 audit: BPF prog-id=69 op=UNLOAD Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.593000 audit: BPF prog-id=93 op=LOAD Feb 9 18:58:11.593000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit: BPF prog-id=94 op=LOAD Feb 9 18:58:11.595000 audit: BPF prog-id=53 op=UNLOAD Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit: BPF prog-id=95 op=LOAD Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit: BPF prog-id=96 op=LOAD Feb 9 18:58:11.595000 audit: BPF prog-id=54 op=UNLOAD Feb 9 18:58:11.595000 audit: BPF prog-id=55 op=UNLOAD Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.595000 audit: BPF prog-id=97 op=LOAD Feb 9 18:58:11.595000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit: BPF prog-id=98 op=LOAD Feb 9 18:58:11.596000 audit: BPF prog-id=56 op=UNLOAD Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit: BPF prog-id=99 op=LOAD Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.597000 audit: BPF prog-id=100 op=LOAD Feb 9 18:58:11.597000 audit: BPF prog-id=57 op=UNLOAD Feb 9 18:58:11.597000 audit: BPF prog-id=58 op=UNLOAD Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.598000 audit: BPF prog-id=101 op=LOAD Feb 9 18:58:11.598000 audit: BPF prog-id=59 op=UNLOAD Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.599000 audit: BPF prog-id=102 op=LOAD Feb 9 18:58:11.599000 audit: BPF prog-id=60 op=UNLOAD Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit: BPF prog-id=103 op=LOAD Feb 9 18:58:11.601000 audit: BPF prog-id=65 op=UNLOAD Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.601000 audit: BPF prog-id=104 op=LOAD Feb 9 18:58:11.601000 audit: BPF prog-id=61 op=UNLOAD Feb 9 18:58:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit: BPF prog-id=105 op=LOAD Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.602000 audit: BPF prog-id=106 op=LOAD Feb 9 18:58:11.602000 audit: BPF prog-id=62 op=UNLOAD Feb 9 18:58:11.602000 audit: BPF prog-id=63 op=UNLOAD Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit: BPF prog-id=107 op=LOAD Feb 9 18:58:11.603000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.603000 audit: BPF prog-id=108 op=LOAD Feb 9 18:58:11.603000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.604000 audit: BPF prog-id=109 op=LOAD Feb 9 18:58:11.604000 audit: BPF prog-id=64 op=UNLOAD Feb 9 18:58:11.621520 systemd[1]: Stopping kubelet.service... Feb 9 18:58:11.644805 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 18:58:11.645017 systemd[1]: Stopped kubelet.service. Feb 9 18:58:11.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:11.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:11.647402 systemd[1]: Started kubelet.service. Feb 9 18:58:11.717843 kubelet[2547]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:58:11.718164 kubelet[2547]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:58:11.718339 kubelet[2547]: I0209 18:58:11.718299 2547 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:58:11.719616 kubelet[2547]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 18:58:11.719693 kubelet[2547]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:58:11.722522 kubelet[2547]: I0209 18:58:11.722495 2547 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 18:58:11.722522 kubelet[2547]: I0209 18:58:11.722521 2547 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:58:11.722695 kubelet[2547]: I0209 18:58:11.722677 2547 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 18:58:11.723954 kubelet[2547]: I0209 18:58:11.723932 2547 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 18:58:11.725665 kubelet[2547]: I0209 18:58:11.725648 2547 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:58:11.726441 kubelet[2547]: W0209 18:58:11.726428 2547 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:58:11.726955 kubelet[2547]: I0209 18:58:11.726940 2547 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:58:11.727141 kubelet[2547]: I0209 18:58:11.727125 2547 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:58:11.727220 kubelet[2547]: I0209 18:58:11.727204 2547 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 18:58:11.727309 kubelet[2547]: I0209 18:58:11.727241 2547 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 18:58:11.727309 kubelet[2547]: I0209 18:58:11.727262 2547 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 18:58:11.727309 kubelet[2547]: I0209 18:58:11.727288 2547 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:58:11.731354 kubelet[2547]: I0209 18:58:11.731111 2547 kubelet.go:398] "Attempting to sync node with API server" Feb 9 18:58:11.731354 kubelet[2547]: I0209 18:58:11.731138 2547 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:58:11.731354 kubelet[2547]: I0209 18:58:11.731162 2547 kubelet.go:297] "Adding apiserver pod source" Feb 9 18:58:11.731354 kubelet[2547]: I0209 18:58:11.731173 2547 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:58:11.734972 kubelet[2547]: I0209 18:58:11.734934 2547 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:58:11.735489 kubelet[2547]: I0209 18:58:11.735466 2547 server.go:1186] "Started kubelet" Feb 9 18:58:11.739260 kubelet[2547]: E0209 18:58:11.739228 2547 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:58:11.739370 kubelet[2547]: E0209 18:58:11.739360 2547 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:58:11.740624 kubelet[2547]: I0209 18:58:11.740612 2547 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:58:11.741234 kubelet[2547]: I0209 18:58:11.741220 2547 server.go:451] "Adding debug handlers to kubelet server" Feb 9 18:58:11.751000 audit[2547]: AVC avc: denied { mac_admin } for pid=2547 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.751000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:11.751000 audit[2547]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f66000 a1=4000e2b110 a2=4000e49fb0 a3=25 items=0 ppid=1 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:11.751000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:11.757794 kubelet[2547]: I0209 18:58:11.753136 2547 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:58:11.757949 kubelet[2547]: I0209 18:58:11.757928 2547 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:58:11.758034 kubelet[2547]: I0209 18:58:11.758025 2547 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:58:11.756000 audit[2547]: AVC avc: denied { mac_admin } for pid=2547 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.756000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:11.756000 audit[2547]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ed6600 a1=4000e2b128 a2=4000f66090 a3=25 items=0 ppid=1 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:11.756000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:11.764700 kubelet[2547]: I0209 18:58:11.764676 2547 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 18:58:11.772826 kubelet[2547]: I0209 18:58:11.772645 2547 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:58:11.796635 kubelet[2547]: I0209 18:58:11.796610 2547 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 18:58:11.863757 kubelet[2547]: I0209 18:58:11.863734 2547 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:58:11.863907 kubelet[2547]: I0209 18:58:11.863894 2547 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:58:11.864018 kubelet[2547]: I0209 18:58:11.864008 2547 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:58:11.864216 kubelet[2547]: I0209 18:58:11.864203 2547 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 18:58:11.864736 kubelet[2547]: I0209 18:58:11.864722 2547 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 18:58:11.864814 kubelet[2547]: I0209 18:58:11.864805 2547 policy_none.go:49] "None policy: Start" Feb 9 18:58:11.869832 kubelet[2547]: I0209 18:58:11.869817 2547 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 18:58:11.869918 kubelet[2547]: I0209 18:58:11.869909 2547 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 18:58:11.870185 kubelet[2547]: I0209 18:58:11.870172 2547 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 18:58:11.870416 kubelet[2547]: E0209 18:58:11.870403 2547 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:58:11.871651 kubelet[2547]: I0209 18:58:11.871636 2547 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.872596 kubelet[2547]: I0209 18:58:11.872581 2547 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:58:11.872725 kubelet[2547]: I0209 18:58:11.872703 2547 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:58:11.872929 kubelet[2547]: I0209 18:58:11.872919 2547 state_mem.go:75] "Updated machine memory state" Feb 9 18:58:11.883662 kubelet[2547]: I0209 18:58:11.883639 2547 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:58:11.883000 audit[2547]: AVC avc: denied { mac_admin } for pid=2547 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:11.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:58:11.883000 audit[2547]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40013abe90 a1=40014159f8 a2=40013abe60 a3=25 items=0 ppid=1 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:11.883000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:58:11.884969 kubelet[2547]: I0209 18:58:11.884955 2547 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:58:11.885233 kubelet[2547]: I0209 18:58:11.885221 2547 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:58:11.898785 kubelet[2547]: I0209 18:58:11.898756 2547 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.898963 kubelet[2547]: I0209 18:58:11.898953 2547 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.970886 kubelet[2547]: I0209 18:58:11.970840 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:11.971702 kubelet[2547]: I0209 18:58:11.971687 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:11.971875 kubelet[2547]: I0209 18:58:11.971851 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:11.975052 kubelet[2547]: I0209 18:58:11.975035 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975357 kubelet[2547]: I0209 18:58:11.975304 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975486 kubelet[2547]: I0209 18:58:11.975476 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975617 kubelet[2547]: I0209 18:58:11.975608 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975731 kubelet[2547]: I0209 18:58:11.975721 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975854 kubelet[2547]: I0209 18:58:11.975844 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ad7577b68aa5aa1e0c4370625c27bfcf-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-71d57399a1\" (UID: \"ad7577b68aa5aa1e0c4370625c27bfcf\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.975981 kubelet[2547]: I0209 18:58:11.975970 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d43e386a31bdd5995ce9402882d38106-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" (UID: \"d43e386a31bdd5995ce9402882d38106\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.976102 kubelet[2547]: I0209 18:58:11.976093 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.976225 kubelet[2547]: I0209 18:58:11.976213 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c2bdbf83a05c72ea9a445924232a63f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-71d57399a1\" (UID: \"1c2bdbf83a05c72ea9a445924232a63f\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:11.993134 kubelet[2547]: E0209 18:58:11.993106 2547 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-71d57399a1\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" Feb 9 18:58:12.733355 kubelet[2547]: I0209 18:58:12.733316 2547 apiserver.go:52] "Watching apiserver" Feb 9 18:58:12.773078 kubelet[2547]: I0209 18:58:12.773022 2547 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:58:12.781353 kubelet[2547]: I0209 18:58:12.781300 2547 reconciler.go:41] "Reconciler: start to sync state" Feb 9 18:58:13.538392 kubelet[2547]: I0209 18:58:13.538361 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-71d57399a1" podStartSLOduration=1.53829716 pod.CreationTimestamp="2024-02-09 18:58:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:13.161567458 +0000 UTC m=+1.509097313" watchObservedRunningTime="2024-02-09 18:58:13.53829716 +0000 UTC m=+1.885827015" Feb 9 18:58:13.538633 kubelet[2547]: I0209 18:58:13.538621 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-71d57399a1" podStartSLOduration=3.5385990449999998 pod.CreationTimestamp="2024-02-09 18:58:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:13.537494388 +0000 UTC m=+1.885024243" watchObservedRunningTime="2024-02-09 18:58:13.538599045 +0000 UTC m=+1.886128900" Feb 9 18:58:14.468395 kubelet[2547]: I0209 18:58:14.468356 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-71d57399a1" podStartSLOduration=3.468317923 pod.CreationTimestamp="2024-02-09 18:58:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:13.938752234 +0000 UTC m=+2.286282089" watchObservedRunningTime="2024-02-09 18:58:14.468317923 +0000 UTC m=+2.815847778" Feb 9 18:58:15.483738 sudo[1752]: pam_unix(sudo:session): session closed for user root Feb 9 18:58:15.482000 audit[1752]: USER_END pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.489347 kernel: kauditd_printk_skb: 275 callbacks suppressed Feb 9 18:58:15.489425 kernel: audit: type=1106 audit(1707505095.482:944): pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.482000 audit[1752]: CRED_DISP pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.530840 kernel: audit: type=1104 audit(1707505095.482:945): pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.566705 sshd[1749]: pam_unix(sshd:session): session closed for user core Feb 9 18:58:15.566000 audit[1749]: USER_END pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:58:15.595484 systemd[1]: sshd@6-10.200.20.14:22-10.200.12.6:39318.service: Deactivated successfully. Feb 9 18:58:15.566000 audit[1749]: CRED_DISP pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:58:15.617500 kernel: audit: type=1106 audit(1707505095.566:946): pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:58:15.617627 kernel: audit: type=1104 audit(1707505095.566:947): pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:58:15.596228 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 18:58:15.596427 systemd[1]: session-9.scope: Consumed 5.374s CPU time. Feb 9 18:58:15.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.14:22-10.200.12.6:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.639638 kernel: audit: type=1131 audit(1707505095.594:948): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.14:22-10.200.12.6:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:15.639844 systemd-logind[1370]: Session 9 logged out. Waiting for processes to exit. Feb 9 18:58:15.641625 systemd-logind[1370]: Removed session 9. Feb 9 18:58:23.646000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.646000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010268e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.701883 kernel: audit: type=1400 audit(1707505103.646:949): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.702051 kernel: audit: type=1300 audit(1707505103.646:949): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40010268e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.727430 kernel: audit: type=1327 audit(1707505103.646:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.646000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.750253 kernel: audit: type=1400 audit(1707505103.646:950): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.646000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f481a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.780308 kernel: audit: type=1300 audit(1707505103.646:950): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f481a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.805506 kernel: audit: type=1327 audit(1707505103.646:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.646000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.828018 kernel: audit: type=1400 audit(1707505103.646:951): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.646000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f481e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.863392 kernel: audit: type=1300 audit(1707505103.646:951): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f481e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.888747 kernel: audit: type=1327 audit(1707505103.646:951): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:23.646000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.916696 kernel: audit: type=1400 audit(1707505103.646:952): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:58:23.646000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f48220 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:58:23.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:58:24.299425 kubelet[2547]: I0209 18:58:24.299321 2547 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 18:58:24.300422 env[1381]: time="2024-02-09T18:58:24.300299599Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:58:24.300678 kubelet[2547]: I0209 18:58:24.300503 2547 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 18:58:24.962106 kubelet[2547]: I0209 18:58:24.962070 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:24.967312 systemd[1]: Created slice kubepods-besteffort-podb43aa3ff_7ba5_485f_bdf8_451b36e9dd33.slice. Feb 9 18:58:24.968564 kubelet[2547]: I0209 18:58:24.968540 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b43aa3ff-7ba5-485f-bdf8-451b36e9dd33-lib-modules\") pod \"kube-proxy-glrm9\" (UID: \"b43aa3ff-7ba5-485f-bdf8-451b36e9dd33\") " pod="kube-system/kube-proxy-glrm9" Feb 9 18:58:24.968973 kubelet[2547]: I0209 18:58:24.968957 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b43aa3ff-7ba5-485f-bdf8-451b36e9dd33-kube-proxy\") pod \"kube-proxy-glrm9\" (UID: \"b43aa3ff-7ba5-485f-bdf8-451b36e9dd33\") " pod="kube-system/kube-proxy-glrm9" Feb 9 18:58:24.969064 kubelet[2547]: I0209 18:58:24.969054 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b43aa3ff-7ba5-485f-bdf8-451b36e9dd33-xtables-lock\") pod \"kube-proxy-glrm9\" (UID: \"b43aa3ff-7ba5-485f-bdf8-451b36e9dd33\") " pod="kube-system/kube-proxy-glrm9" Feb 9 18:58:25.069606 kubelet[2547]: I0209 18:58:25.069560 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s25h9\" (UniqueName: \"kubernetes.io/projected/b43aa3ff-7ba5-485f-bdf8-451b36e9dd33-kube-api-access-s25h9\") pod \"kube-proxy-glrm9\" (UID: \"b43aa3ff-7ba5-485f-bdf8-451b36e9dd33\") " pod="kube-system/kube-proxy-glrm9" Feb 9 18:58:25.088948 kubelet[2547]: I0209 18:58:25.088896 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:25.093491 systemd[1]: Created slice kubepods-besteffort-pod4fbf33f9_56ea_4507_8a76_ef18249578d0.slice. Feb 9 18:58:25.271117 kubelet[2547]: I0209 18:58:25.271019 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4fbf33f9-56ea-4507-8a76-ef18249578d0-var-lib-calico\") pod \"tigera-operator-cfc98749c-bwfjq\" (UID: \"4fbf33f9-56ea-4507-8a76-ef18249578d0\") " pod="tigera-operator/tigera-operator-cfc98749c-bwfjq" Feb 9 18:58:25.271316 kubelet[2547]: I0209 18:58:25.271302 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bfglb\" (UniqueName: \"kubernetes.io/projected/4fbf33f9-56ea-4507-8a76-ef18249578d0-kube-api-access-bfglb\") pod \"tigera-operator-cfc98749c-bwfjq\" (UID: \"4fbf33f9-56ea-4507-8a76-ef18249578d0\") " pod="tigera-operator/tigera-operator-cfc98749c-bwfjq" Feb 9 18:58:25.277805 env[1381]: time="2024-02-09T18:58:25.277757223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-glrm9,Uid:b43aa3ff-7ba5-485f-bdf8-451b36e9dd33,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:25.326126 env[1381]: time="2024-02-09T18:58:25.325080352Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:25.326126 env[1381]: time="2024-02-09T18:58:25.325119353Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:25.326126 env[1381]: time="2024-02-09T18:58:25.325129993Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:25.326126 env[1381]: time="2024-02-09T18:58:25.325235634Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4 pid=2664 runtime=io.containerd.runc.v2 Feb 9 18:58:25.342605 systemd[1]: run-containerd-runc-k8s.io-237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4-runc.nioUKR.mount: Deactivated successfully. Feb 9 18:58:25.344206 systemd[1]: Started cri-containerd-237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4.scope. Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.354000 audit: BPF prog-id=110 op=LOAD Feb 9 18:58:25.355000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.355000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376631616332396331616662326336346432353765623437376362 Feb 9 18:58:25.355000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.355000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376631616332396331616662326336346432353765623437376362 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit: BPF prog-id=111 op=LOAD Feb 9 18:58:25.356000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376631616332396331616662326336346432353765623437376362 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.356000 audit: BPF prog-id=112 op=LOAD Feb 9 18:58:25.356000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376631616332396331616662326336346432353765623437376362 Feb 9 18:58:25.357000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:58:25.357000 audit: BPF prog-id=111 op=UNLOAD Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { perfmon } for pid=2674 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit[2674]: AVC avc: denied { bpf } for pid=2674 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.357000 audit: BPF prog-id=113 op=LOAD Feb 9 18:58:25.357000 audit[2674]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2664 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233376631616332396331616662326336346432353765623437376362 Feb 9 18:58:25.370800 env[1381]: time="2024-02-09T18:58:25.370752982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-glrm9,Uid:b43aa3ff-7ba5-485f-bdf8-451b36e9dd33,Namespace:kube-system,Attempt:0,} returns sandbox id \"237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4\"" Feb 9 18:58:25.381718 env[1381]: time="2024-02-09T18:58:25.381680834Z" level=info msg="CreateContainer within sandbox \"237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:58:25.397459 env[1381]: time="2024-02-09T18:58:25.397413703Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-bwfjq,Uid:4fbf33f9-56ea-4507-8a76-ef18249578d0,Namespace:tigera-operator,Attempt:0,}" Feb 9 18:58:25.458795 env[1381]: time="2024-02-09T18:58:25.458730801Z" level=info msg="CreateContainer within sandbox \"237f1ac29c1afb2c64d257eb477cb0d4f480ce01bab9f111cd4202c9f090f4e4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"ce549384f70d62a29c6c8f2d6883b34b9f259cd7461607ac12aa2bf799682cdc\"" Feb 9 18:58:25.459787 env[1381]: time="2024-02-09T18:58:25.459757854Z" level=info msg="StartContainer for \"ce549384f70d62a29c6c8f2d6883b34b9f259cd7461607ac12aa2bf799682cdc\"" Feb 9 18:58:25.468795 env[1381]: time="2024-02-09T18:58:25.468717161Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:25.468921 env[1381]: time="2024-02-09T18:58:25.468805042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:25.468921 env[1381]: time="2024-02-09T18:58:25.468832003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:25.469128 env[1381]: time="2024-02-09T18:58:25.469090646Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127 pid=2710 runtime=io.containerd.runc.v2 Feb 9 18:58:25.481947 systemd[1]: Started cri-containerd-ce549384f70d62a29c6c8f2d6883b34b9f259cd7461607ac12aa2bf799682cdc.scope. Feb 9 18:58:25.487890 systemd[1]: Started cri-containerd-b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127.scope. Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353439333834663730643632613239633663386632643638383362 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.504000 audit: BPF prog-id=114 op=LOAD Feb 9 18:58:25.504000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353439333834663730643632613239633663386632643638383362 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit: BPF prog-id=115 op=LOAD Feb 9 18:58:25.505000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353439333834663730643632613239633663386632643638383362 Feb 9 18:58:25.505000 audit: BPF prog-id=115 op=UNLOAD Feb 9 18:58:25.505000 audit: BPF prog-id=114 op=UNLOAD Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { perfmon } for pid=2722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit[2722]: AVC avc: denied { bpf } for pid=2722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.505000 audit: BPF prog-id=116 op=LOAD Feb 9 18:58:25.505000 audit[2722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2664 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365353439333834663730643632613239633663386632643638383362 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.512000 audit: BPF prog-id=117 op=LOAD Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2710 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235646639643633633838636664666631343438373834633430383264 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2710 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235646639643633633838636664666631343438373834633430383264 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit: BPF prog-id=118 op=LOAD Feb 9 18:58:25.513000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2710 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235646639643633633838636664666631343438373834633430383264 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.513000 audit: BPF prog-id=119 op=LOAD Feb 9 18:58:25.513000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2710 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235646639643633633838636664666631343438373834633430383264 Feb 9 18:58:25.513000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:58:25.514000 audit: BPF prog-id=118 op=UNLOAD Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:25.514000 audit: BPF prog-id=120 op=LOAD Feb 9 18:58:25.514000 audit[2724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2710 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.514000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235646639643633633838636664666631343438373834633430383264 Feb 9 18:58:25.539723 env[1381]: time="2024-02-09T18:58:25.535900290Z" level=info msg="StartContainer for \"ce549384f70d62a29c6c8f2d6883b34b9f259cd7461607ac12aa2bf799682cdc\" returns successfully" Feb 9 18:58:25.545608 env[1381]: time="2024-02-09T18:58:25.545546806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-bwfjq,Uid:4fbf33f9-56ea-4507-8a76-ef18249578d0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127\"" Feb 9 18:58:25.548386 env[1381]: time="2024-02-09T18:58:25.547814474Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 18:58:25.586000 audit[2796]: NETFILTER_CFG table=mangle:63 family=2 entries=1 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.586000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec595db0 a2=0 a3=ffff943256c0 items=0 ppid=2745 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:58:25.587000 audit[2797]: NETFILTER_CFG table=mangle:64 family=10 entries=1 op=nft_register_chain pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.587000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd80fc5e0 a2=0 a3=ffff8583d6c0 items=0 ppid=2745 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:58:25.589000 audit[2798]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.589000 audit[2798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4f8c5c0 a2=0 a3=ffffa948a6c0 items=0 ppid=2745 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:58:25.590000 audit[2799]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.590000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda8917e0 a2=0 a3=ffff84ef76c0 items=0 ppid=2745 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.590000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:58:25.591000 audit[2800]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.591000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf58a470 a2=0 a3=ffff8ad256c0 items=0 ppid=2745 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:58:25.592000 audit[2801]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.592000 audit[2801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccb98b10 a2=0 a3=ffff8c45d6c0 items=0 ppid=2745 pid=2801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:58:25.684000 audit[2802]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.684000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc87bcdb0 a2=0 a3=ffffae4ea6c0 items=0 ppid=2745 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:58:25.686000 audit[2804]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.686000 audit[2804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdee0ac40 a2=0 a3=ffffa960a6c0 items=0 ppid=2745 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:58:25.690000 audit[2807]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.690000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc90b07c0 a2=0 a3=ffffaf32a6c0 items=0 ppid=2745 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:58:25.691000 audit[2808]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_chain pid=2808 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.691000 audit[2808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd120f40 a2=0 a3=ffffa9b4e6c0 items=0 ppid=2745 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:58:25.693000 audit[2810]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.693000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd2a02af0 a2=0 a3=ffff97dbd6c0 items=0 ppid=2745 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:58:25.694000 audit[2811]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.694000 audit[2811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd959f210 a2=0 a3=ffffb211a6c0 items=0 ppid=2745 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:58:25.696000 audit[2813]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.696000 audit[2813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd4e29e0 a2=0 a3=ffffbbf7d6c0 items=0 ppid=2745 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:58:25.700000 audit[2816]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.700000 audit[2816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa4ffd00 a2=0 a3=ffff90d0a6c0 items=0 ppid=2745 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:58:25.701000 audit[2817]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.701000 audit[2817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6572530 a2=0 a3=ffffba5806c0 items=0 ppid=2745 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:58:25.703000 audit[2820]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.703000 audit[2820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff6814370 a2=0 a3=ffffb71c36c0 items=0 ppid=2745 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:58:25.705000 audit[2821]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_chain pid=2821 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.705000 audit[2821]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd93e100 a2=0 a3=ffffb25526c0 items=0 ppid=2745 pid=2821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:58:25.707000 audit[2823]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.707000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffda504b60 a2=0 a3=ffffa680c6c0 items=0 ppid=2745 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:58:25.710000 audit[2826]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.710000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff8fa7300 a2=0 a3=ffff9c07c6c0 items=0 ppid=2745 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:58:25.714000 audit[2829]: NETFILTER_CFG table=filter:82 family=2 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.714000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb985a50 a2=0 a3=ffffa18926c0 items=0 ppid=2745 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:58:25.715000 audit[2830]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.715000 audit[2830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc0afbcc0 a2=0 a3=ffffa216f6c0 items=0 ppid=2745 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:58:25.717000 audit[2832]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.717000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff12700f0 a2=0 a3=ffff917b76c0 items=0 ppid=2745 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:58:25.720000 audit[2835]: NETFILTER_CFG table=nat:85 family=2 entries=1 op=nft_register_rule pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:58:25.720000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcbe69a30 a2=0 a3=ffffb40496c0 items=0 ppid=2745 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:58:25.757000 audit[2839]: NETFILTER_CFG table=filter:86 family=2 entries=6 op=nft_register_rule pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:25.757000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffead54430 a2=0 a3=ffffadc096c0 items=0 ppid=2745 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.757000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:25.791000 audit[2839]: NETFILTER_CFG table=nat:87 family=2 entries=17 op=nft_register_chain pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:25.791000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffead54430 a2=0 a3=ffffadc096c0 items=0 ppid=2745 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.791000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:25.794000 audit[2843]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.794000 audit[2843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdcf13060 a2=0 a3=ffffb07546c0 items=0 ppid=2745 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:58:25.796000 audit[2845]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.796000 audit[2845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffee1c3410 a2=0 a3=ffffbc82a6c0 items=0 ppid=2745 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:58:25.801000 audit[2848]: NETFILTER_CFG table=filter:90 family=10 entries=2 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.801000 audit[2848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe6bf7010 a2=0 a3=ffffb4e3e6c0 items=0 ppid=2745 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:58:25.802000 audit[2849]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_chain pid=2849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.802000 audit[2849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbc867a0 a2=0 a3=ffff8aa386c0 items=0 ppid=2745 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.802000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:58:25.804000 audit[2851]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.804000 audit[2851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd59f3980 a2=0 a3=ffffb8b626c0 items=0 ppid=2745 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:58:25.806000 audit[2852]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.806000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbf093e0 a2=0 a3=ffffba54e6c0 items=0 ppid=2745 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.806000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:58:25.808000 audit[2854]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_rule pid=2854 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.808000 audit[2854]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd92ff700 a2=0 a3=ffffb8f6c6c0 items=0 ppid=2745 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:58:25.811000 audit[2857]: NETFILTER_CFG table=filter:95 family=10 entries=2 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.811000 audit[2857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe23410f0 a2=0 a3=ffffafd806c0 items=0 ppid=2745 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:58:25.812000 audit[2858]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_chain pid=2858 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.812000 audit[2858]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0293d50 a2=0 a3=ffffb8e256c0 items=0 ppid=2745 pid=2858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:58:25.814000 audit[2860]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.814000 audit[2860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd8f7b400 a2=0 a3=ffff816676c0 items=0 ppid=2745 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:58:25.815000 audit[2861]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_chain pid=2861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.815000 audit[2861]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc11f0cd0 a2=0 a3=ffffbac5b6c0 items=0 ppid=2745 pid=2861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.815000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:58:25.817000 audit[2863]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.817000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5ea0950 a2=0 a3=ffffb058e6c0 items=0 ppid=2745 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:58:25.820000 audit[2866]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.820000 audit[2866]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffa5f100 a2=0 a3=ffffb59c26c0 items=0 ppid=2745 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:58:25.823000 audit[2869]: NETFILTER_CFG table=filter:101 family=10 entries=1 op=nft_register_rule pid=2869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.823000 audit[2869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc3c99f0 a2=0 a3=ffff8f8a86c0 items=0 ppid=2745 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:58:25.825000 audit[2870]: NETFILTER_CFG table=nat:102 family=10 entries=1 op=nft_register_chain pid=2870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.825000 audit[2870]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffea6b04c0 a2=0 a3=ffffb3a2a6c0 items=0 ppid=2745 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:58:25.827000 audit[2872]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.827000 audit[2872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffef249a90 a2=0 a3=ffffbdd116c0 items=0 ppid=2745 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:58:25.829000 audit[2875]: NETFILTER_CFG table=nat:104 family=10 entries=2 op=nft_register_chain pid=2875 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:58:25.829000 audit[2875]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdb509090 a2=0 a3=ffffb6dfe6c0 items=0 ppid=2745 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:58:25.834000 audit[2879]: NETFILTER_CFG table=filter:105 family=10 entries=3 op=nft_register_rule pid=2879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:58:25.834000 audit[2879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe30b62c0 a2=0 a3=ffff859646c0 items=0 ppid=2745 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.834000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:25.834000 audit[2879]: NETFILTER_CFG table=nat:106 family=10 entries=10 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:58:25.834000 audit[2879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe30b62c0 a2=0 a3=ffff859646c0 items=0 ppid=2745 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:25.834000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:27.157213 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3745432691.mount: Deactivated successfully. Feb 9 18:58:28.134624 env[1381]: time="2024-02-09T18:58:28.134581631Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:28.145888 env[1381]: time="2024-02-09T18:58:28.145851119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:28.153042 env[1381]: time="2024-02-09T18:58:28.153005280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:28.159798 env[1381]: time="2024-02-09T18:58:28.159762316Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:28.160692 env[1381]: time="2024-02-09T18:58:28.160662926Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 9 18:58:28.163505 env[1381]: time="2024-02-09T18:58:28.163477718Z" level=info msg="CreateContainer within sandbox \"b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 18:58:28.208827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1601979422.mount: Deactivated successfully. Feb 9 18:58:28.212951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1619966105.mount: Deactivated successfully. Feb 9 18:58:28.234322 env[1381]: time="2024-02-09T18:58:28.234273600Z" level=info msg="CreateContainer within sandbox \"b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123\"" Feb 9 18:58:28.235217 env[1381]: time="2024-02-09T18:58:28.235190051Z" level=info msg="StartContainer for \"c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123\"" Feb 9 18:58:28.253354 systemd[1]: Started cri-containerd-c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123.scope. Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.266000 audit: BPF prog-id=121 op=LOAD Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2710 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333030303764356364633534633834663039313466333435613931 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2710 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333030303764356364633534633834663039313466333435613931 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit: BPF prog-id=122 op=LOAD Feb 9 18:58:28.267000 audit[2889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2710 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333030303764356364633534633834663039313466333435613931 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit: BPF prog-id=123 op=LOAD Feb 9 18:58:28.267000 audit[2889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2710 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333030303764356364633534633834663039313466333435613931 Feb 9 18:58:28.267000 audit: BPF prog-id=123 op=UNLOAD Feb 9 18:58:28.267000 audit: BPF prog-id=122 op=UNLOAD Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { perfmon } for pid=2889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit[2889]: AVC avc: denied { bpf } for pid=2889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:28.267000 audit: BPF prog-id=124 op=LOAD Feb 9 18:58:28.267000 audit[2889]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2710 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:28.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333030303764356364633534633834663039313466333435613931 Feb 9 18:58:28.296801 env[1381]: time="2024-02-09T18:58:28.296757188Z" level=info msg="StartContainer for \"c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123\" returns successfully" Feb 9 18:58:28.943189 kubelet[2547]: I0209 18:58:28.943145 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-glrm9" podStartSLOduration=4.943108589 pod.CreationTimestamp="2024-02-09 18:58:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:25.940093596 +0000 UTC m=+14.287623451" watchObservedRunningTime="2024-02-09 18:58:28.943108589 +0000 UTC m=+17.290638444" Feb 9 18:58:28.943594 kubelet[2547]: I0209 18:58:28.943232 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-bwfjq" podStartSLOduration=-9.22337203291156e+09 pod.CreationTimestamp="2024-02-09 18:58:25 +0000 UTC" firstStartedPulling="2024-02-09 18:58:25.547289027 +0000 UTC m=+13.894818882" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:28.942834506 +0000 UTC m=+17.290364361" watchObservedRunningTime="2024-02-09 18:58:28.94321595 +0000 UTC m=+17.290745805" Feb 9 18:58:31.145316 kernel: kauditd_printk_skb: 348 callbacks suppressed Feb 9 18:58:31.145479 kernel: audit: type=1325 audit(1707505111.139:1057): table=filter:107 family=2 entries=13 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.139000 audit[2944]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.139000 audit[2944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd16693b0 a2=0 a3=ffff805606c0 items=0 ppid=2745 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.189029 kernel: audit: type=1300 audit(1707505111.139:1057): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd16693b0 a2=0 a3=ffff805606c0 items=0 ppid=2745 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.203750 kernel: audit: type=1327 audit(1707505111.139:1057): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.144000 audit[2944]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.218595 kernel: audit: type=1325 audit(1707505111.144:1058): table=nat:108 family=2 entries=20 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.144000 audit[2944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd16693b0 a2=0 a3=ffff805606c0 items=0 ppid=2745 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.248104 kernel: audit: type=1300 audit(1707505111.144:1058): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd16693b0 a2=0 a3=ffff805606c0 items=0 ppid=2745 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.262028 kernel: audit: type=1327 audit(1707505111.144:1058): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.296632 kubelet[2547]: I0209 18:58:31.296593 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:31.301506 systemd[1]: Created slice kubepods-besteffort-pod07f865ee_c96d_4837_aaa4_901c963ee9ce.slice. Feb 9 18:58:31.305217 kubelet[2547]: I0209 18:58:31.305181 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/07f865ee-c96d-4837-aaa4-901c963ee9ce-typha-certs\") pod \"calico-typha-84944f56d7-5jcgf\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " pod="calico-system/calico-typha-84944f56d7-5jcgf" Feb 9 18:58:31.305363 kubelet[2547]: I0209 18:58:31.305238 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07f865ee-c96d-4837-aaa4-901c963ee9ce-tigera-ca-bundle\") pod \"calico-typha-84944f56d7-5jcgf\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " pod="calico-system/calico-typha-84944f56d7-5jcgf" Feb 9 18:58:31.305398 kubelet[2547]: I0209 18:58:31.305369 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lnb2c\" (UniqueName: \"kubernetes.io/projected/07f865ee-c96d-4837-aaa4-901c963ee9ce-kube-api-access-lnb2c\") pod \"calico-typha-84944f56d7-5jcgf\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " pod="calico-system/calico-typha-84944f56d7-5jcgf" Feb 9 18:58:31.406428 kubelet[2547]: I0209 18:58:31.406317 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:31.415223 systemd[1]: Created slice kubepods-besteffort-pod5c3ef883_e8df_40ba_b38c_6221e35c2faf.slice. Feb 9 18:58:31.422000 audit[2970]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.438532 kubelet[2547]: W0209 18:58:31.424774 2547 reflector.go:424] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.2-a-71d57399a1" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-71d57399a1' and this object Feb 9 18:58:31.438532 kubelet[2547]: E0209 18:58:31.424835 2547 reflector.go:140] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.2-a-71d57399a1" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.2-a-71d57399a1' and this object Feb 9 18:58:31.422000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd90d6d70 a2=0 a3=ffff9ab096c0 items=0 ppid=2745 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.468006 kernel: audit: type=1325 audit(1707505111.422:1059): table=filter:109 family=2 entries=14 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.468180 kernel: audit: type=1300 audit(1707505111.422:1059): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffd90d6d70 a2=0 a3=ffff9ab096c0 items=0 ppid=2745 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.485601 kernel: audit: type=1327 audit(1707505111.422:1059): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.450000 audit[2970]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.500540 kernel: audit: type=1325 audit(1707505111.450:1060): table=nat:110 family=2 entries=20 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:31.450000 audit[2970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd90d6d70 a2=0 a3=ffff9ab096c0 items=0 ppid=2745 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:31.505854 kubelet[2547]: I0209 18:58:31.505819 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-run-calico\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.505940 kubelet[2547]: I0209 18:58:31.505870 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-bin-dir\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.505940 kubelet[2547]: I0209 18:58:31.505898 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k2vb4\" (UniqueName: \"kubernetes.io/projected/5c3ef883-e8df-40ba-b38c-6221e35c2faf-kube-api-access-k2vb4\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.505940 kubelet[2547]: I0209 18:58:31.505919 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-flexvol-driver-host\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506011 kubelet[2547]: I0209 18:58:31.505943 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-net-dir\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506011 kubelet[2547]: I0209 18:58:31.505963 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-xtables-lock\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506011 kubelet[2547]: I0209 18:58:31.505983 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c3ef883-e8df-40ba-b38c-6221e35c2faf-tigera-ca-bundle\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506011 kubelet[2547]: I0209 18:58:31.506004 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-lib-calico\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506148 kubelet[2547]: I0209 18:58:31.506024 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-log-dir\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506148 kubelet[2547]: I0209 18:58:31.506045 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-policysync\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506148 kubelet[2547]: I0209 18:58:31.506065 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.506148 kubelet[2547]: I0209 18:58:31.506085 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-lib-modules\") pod \"calico-node-tfsbs\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " pod="calico-system/calico-node-tfsbs" Feb 9 18:58:31.545317 kubelet[2547]: I0209 18:58:31.545275 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:31.545551 kubelet[2547]: E0209 18:58:31.545525 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:31.605062 env[1381]: time="2024-02-09T18:58:31.604666805Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84944f56d7-5jcgf,Uid:07f865ee-c96d-4837-aaa4-901c963ee9ce,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:31.609560 kubelet[2547]: E0209 18:58:31.609534 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.609763 kubelet[2547]: W0209 18:58:31.609745 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.609853 kubelet[2547]: E0209 18:58:31.609841 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.610115 kubelet[2547]: E0209 18:58:31.610101 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.610211 kubelet[2547]: W0209 18:58:31.610198 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.610881 kubelet[2547]: E0209 18:58:31.610861 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.611224 kubelet[2547]: E0209 18:58:31.611210 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.611338 kubelet[2547]: W0209 18:58:31.611325 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.611413 kubelet[2547]: E0209 18:58:31.611404 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.611674 kubelet[2547]: E0209 18:58:31.611663 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.611756 kubelet[2547]: W0209 18:58:31.611744 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.611841 kubelet[2547]: E0209 18:58:31.611831 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.612096 kubelet[2547]: E0209 18:58:31.612084 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.612186 kubelet[2547]: W0209 18:58:31.612175 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.612274 kubelet[2547]: E0209 18:58:31.612265 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.612518 kubelet[2547]: E0209 18:58:31.612506 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.612620 kubelet[2547]: W0209 18:58:31.612608 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.612691 kubelet[2547]: E0209 18:58:31.612682 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.614782 kubelet[2547]: E0209 18:58:31.614766 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.614893 kubelet[2547]: W0209 18:58:31.614880 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.614977 kubelet[2547]: E0209 18:58:31.614967 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.615351 kubelet[2547]: E0209 18:58:31.615334 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.615495 kubelet[2547]: W0209 18:58:31.615480 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.615572 kubelet[2547]: E0209 18:58:31.615559 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.616209 kubelet[2547]: E0209 18:58:31.616193 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.616364 kubelet[2547]: W0209 18:58:31.616350 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.616439 kubelet[2547]: E0209 18:58:31.616430 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.617283 kubelet[2547]: E0209 18:58:31.616821 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.617283 kubelet[2547]: W0209 18:58:31.616840 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.617283 kubelet[2547]: E0209 18:58:31.616854 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.617952 kubelet[2547]: E0209 18:58:31.617926 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.617952 kubelet[2547]: W0209 18:58:31.617945 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.618048 kubelet[2547]: E0209 18:58:31.617992 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.618486 kubelet[2547]: E0209 18:58:31.618459 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.618486 kubelet[2547]: W0209 18:58:31.618478 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.618585 kubelet[2547]: E0209 18:58:31.618495 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.618822 kubelet[2547]: E0209 18:58:31.618800 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.618822 kubelet[2547]: W0209 18:58:31.618815 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.618911 kubelet[2547]: E0209 18:58:31.618829 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.619457 kubelet[2547]: E0209 18:58:31.619429 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.619457 kubelet[2547]: W0209 18:58:31.619450 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.619565 kubelet[2547]: E0209 18:58:31.619464 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.619936 kubelet[2547]: E0209 18:58:31.619915 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.619936 kubelet[2547]: W0209 18:58:31.619934 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.620019 kubelet[2547]: E0209 18:58:31.619948 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.658290 env[1381]: time="2024-02-09T18:58:31.656717201Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:31.658290 env[1381]: time="2024-02-09T18:58:31.656757802Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:31.658290 env[1381]: time="2024-02-09T18:58:31.656768122Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:31.658696 env[1381]: time="2024-02-09T18:58:31.658618702Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9 pid=2996 runtime=io.containerd.runc.v2 Feb 9 18:58:31.675181 systemd[1]: Started cri-containerd-d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9.scope. Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit: BPF prog-id=125 op=LOAD Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438616235326536386231363738643733396338353338306565396135 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438616235326536386231363738643733396338353338306565396135 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.692000 audit: BPF prog-id=126 op=LOAD Feb 9 18:58:31.692000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438616235326536386231363738643733396338353338306565396135 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit: BPF prog-id=127 op=LOAD Feb 9 18:58:31.693000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438616235326536386231363738643733396338353338306565396135 Feb 9 18:58:31.693000 audit: BPF prog-id=127 op=UNLOAD Feb 9 18:58:31.693000 audit: BPF prog-id=126 op=UNLOAD Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:31.693000 audit: BPF prog-id=128 op=LOAD Feb 9 18:58:31.693000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2996 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:31.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438616235326536386231363738643733396338353338306565396135 Feb 9 18:58:31.708665 kubelet[2547]: E0209 18:58:31.708495 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.708665 kubelet[2547]: W0209 18:58:31.708510 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.708665 kubelet[2547]: E0209 18:58:31.708531 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.708665 kubelet[2547]: I0209 18:58:31.708564 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/049837c9-e835-4853-993b-156aeaf6d766-kubelet-dir\") pod \"csi-node-driver-gbxpr\" (UID: \"049837c9-e835-4853-993b-156aeaf6d766\") " pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:31.709005 kubelet[2547]: E0209 18:58:31.708900 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.709005 kubelet[2547]: W0209 18:58:31.708911 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.709005 kubelet[2547]: E0209 18:58:31.708934 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.709231 kubelet[2547]: E0209 18:58:31.709144 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.709231 kubelet[2547]: W0209 18:58:31.709155 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.709231 kubelet[2547]: E0209 18:58:31.709169 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.709512 kubelet[2547]: E0209 18:58:31.709389 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.709512 kubelet[2547]: W0209 18:58:31.709400 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.709512 kubelet[2547]: E0209 18:58:31.709412 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.709659 kubelet[2547]: E0209 18:58:31.709648 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.709713 kubelet[2547]: W0209 18:58:31.709703 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.709767 kubelet[2547]: E0209 18:58:31.709759 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.709852 kubelet[2547]: I0209 18:58:31.709843 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/049837c9-e835-4853-993b-156aeaf6d766-socket-dir\") pod \"csi-node-driver-gbxpr\" (UID: \"049837c9-e835-4853-993b-156aeaf6d766\") " pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:31.710321 kubelet[2547]: E0209 18:58:31.710052 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.710321 kubelet[2547]: W0209 18:58:31.710068 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.710321 kubelet[2547]: E0209 18:58:31.710083 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.710321 kubelet[2547]: E0209 18:58:31.710219 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.710321 kubelet[2547]: W0209 18:58:31.710229 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.710321 kubelet[2547]: E0209 18:58:31.710239 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.710490 kubelet[2547]: E0209 18:58:31.710413 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.710490 kubelet[2547]: W0209 18:58:31.710422 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.710490 kubelet[2547]: E0209 18:58:31.710433 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.710490 kubelet[2547]: I0209 18:58:31.710453 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-594jq\" (UniqueName: \"kubernetes.io/projected/049837c9-e835-4853-993b-156aeaf6d766-kube-api-access-594jq\") pod \"csi-node-driver-gbxpr\" (UID: \"049837c9-e835-4853-993b-156aeaf6d766\") " pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:31.710607 kubelet[2547]: E0209 18:58:31.710577 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.710607 kubelet[2547]: W0209 18:58:31.710592 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.710607 kubelet[2547]: E0209 18:58:31.710604 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713343 kubelet[2547]: E0209 18:58:31.710709 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713343 kubelet[2547]: W0209 18:58:31.710720 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713343 kubelet[2547]: E0209 18:58:31.710730 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713343 kubelet[2547]: E0209 18:58:31.710874 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713343 kubelet[2547]: W0209 18:58:31.710888 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713343 kubelet[2547]: E0209 18:58:31.710899 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713343 kubelet[2547]: I0209 18:58:31.710916 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/049837c9-e835-4853-993b-156aeaf6d766-registration-dir\") pod \"csi-node-driver-gbxpr\" (UID: \"049837c9-e835-4853-993b-156aeaf6d766\") " pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:31.713343 kubelet[2547]: E0209 18:58:31.711037 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713343 kubelet[2547]: W0209 18:58:31.711044 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711053 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711160 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713601 kubelet[2547]: W0209 18:58:31.711166 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711178 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713601 kubelet[2547]: I0209 18:58:31.711193 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/049837c9-e835-4853-993b-156aeaf6d766-varrun\") pod \"csi-node-driver-gbxpr\" (UID: \"049837c9-e835-4853-993b-156aeaf6d766\") " pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711359 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713601 kubelet[2547]: W0209 18:58:31.711367 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711378 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713601 kubelet[2547]: E0209 18:58:31.711481 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713786 kubelet[2547]: W0209 18:58:31.711489 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713786 kubelet[2547]: E0209 18:58:31.711497 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713786 kubelet[2547]: E0209 18:58:31.711602 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713786 kubelet[2547]: W0209 18:58:31.711609 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713786 kubelet[2547]: E0209 18:58:31.711617 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.713786 kubelet[2547]: E0209 18:58:31.711728 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.713786 kubelet[2547]: W0209 18:58:31.711735 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.713786 kubelet[2547]: E0209 18:58:31.711744 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.723764 env[1381]: time="2024-02-09T18:58:31.723723877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84944f56d7-5jcgf,Uid:07f865ee-c96d-4837-aaa4-901c963ee9ce,Namespace:calico-system,Attempt:0,} returns sandbox id \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\"" Feb 9 18:58:31.724974 env[1381]: time="2024-02-09T18:58:31.724929770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 18:58:31.811896 kubelet[2547]: E0209 18:58:31.811870 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.812057 kubelet[2547]: W0209 18:58:31.812043 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.812123 kubelet[2547]: E0209 18:58:31.812114 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.812399 kubelet[2547]: E0209 18:58:31.812387 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.812492 kubelet[2547]: W0209 18:58:31.812480 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.812556 kubelet[2547]: E0209 18:58:31.812548 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.812765 kubelet[2547]: E0209 18:58:31.812754 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.812831 kubelet[2547]: W0209 18:58:31.812819 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.812890 kubelet[2547]: E0209 18:58:31.812882 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.813071 kubelet[2547]: E0209 18:58:31.813061 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.813149 kubelet[2547]: W0209 18:58:31.813138 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.813212 kubelet[2547]: E0209 18:58:31.813203 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.813440 kubelet[2547]: E0209 18:58:31.813430 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.813521 kubelet[2547]: W0209 18:58:31.813510 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.813576 kubelet[2547]: E0209 18:58:31.813569 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.813762 kubelet[2547]: E0209 18:58:31.813752 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.813830 kubelet[2547]: W0209 18:58:31.813819 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.813889 kubelet[2547]: E0209 18:58:31.813881 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.814092 kubelet[2547]: E0209 18:58:31.814083 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.814162 kubelet[2547]: W0209 18:58:31.814152 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.814299 kubelet[2547]: E0209 18:58:31.814289 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.814519 kubelet[2547]: E0209 18:58:31.814508 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.814592 kubelet[2547]: W0209 18:58:31.814580 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.814649 kubelet[2547]: E0209 18:58:31.814642 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.814845 kubelet[2547]: E0209 18:58:31.814835 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.814909 kubelet[2547]: W0209 18:58:31.814899 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.814962 kubelet[2547]: E0209 18:58:31.814954 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.815154 kubelet[2547]: E0209 18:58:31.815145 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.815223 kubelet[2547]: W0209 18:58:31.815213 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.815310 kubelet[2547]: E0209 18:58:31.815301 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.815496 kubelet[2547]: E0209 18:58:31.815485 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.815565 kubelet[2547]: W0209 18:58:31.815554 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.815623 kubelet[2547]: E0209 18:58:31.815615 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.815867 kubelet[2547]: E0209 18:58:31.815855 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.815943 kubelet[2547]: W0209 18:58:31.815933 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.815996 kubelet[2547]: E0209 18:58:31.815989 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.816187 kubelet[2547]: E0209 18:58:31.816177 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.816277 kubelet[2547]: W0209 18:58:31.816265 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.816347 kubelet[2547]: E0209 18:58:31.816339 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.816564 kubelet[2547]: E0209 18:58:31.816553 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.816637 kubelet[2547]: W0209 18:58:31.816625 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.816727 kubelet[2547]: E0209 18:58:31.816718 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.816914 kubelet[2547]: E0209 18:58:31.816904 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.816983 kubelet[2547]: W0209 18:58:31.816972 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.817042 kubelet[2547]: E0209 18:58:31.817034 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.817231 kubelet[2547]: E0209 18:58:31.817221 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.817384 kubelet[2547]: W0209 18:58:31.817371 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.817450 kubelet[2547]: E0209 18:58:31.817442 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.817659 kubelet[2547]: E0209 18:58:31.817649 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.817734 kubelet[2547]: W0209 18:58:31.817723 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.817792 kubelet[2547]: E0209 18:58:31.817784 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.817965 kubelet[2547]: E0209 18:58:31.817955 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.818033 kubelet[2547]: W0209 18:58:31.818022 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.818091 kubelet[2547]: E0209 18:58:31.818083 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.818478 kubelet[2547]: E0209 18:58:31.818467 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.818554 kubelet[2547]: W0209 18:58:31.818543 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.818634 kubelet[2547]: E0209 18:58:31.818621 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.818889 kubelet[2547]: E0209 18:58:31.818878 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.818956 kubelet[2547]: W0209 18:58:31.818946 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.819020 kubelet[2547]: E0209 18:58:31.819012 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.819550 kubelet[2547]: E0209 18:58:31.819537 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.819658 kubelet[2547]: W0209 18:58:31.819645 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.819726 kubelet[2547]: E0209 18:58:31.819718 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.819938 kubelet[2547]: E0209 18:58:31.819928 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.820008 kubelet[2547]: W0209 18:58:31.819998 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.820067 kubelet[2547]: E0209 18:58:31.820060 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.820355 kubelet[2547]: E0209 18:58:31.820344 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.820438 kubelet[2547]: W0209 18:58:31.820427 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.820504 kubelet[2547]: E0209 18:58:31.820496 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.820682 kubelet[2547]: E0209 18:58:31.820672 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.820749 kubelet[2547]: W0209 18:58:31.820739 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.820807 kubelet[2547]: E0209 18:58:31.820799 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.820982 kubelet[2547]: E0209 18:58:31.820973 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.821043 kubelet[2547]: W0209 18:58:31.821033 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.821103 kubelet[2547]: E0209 18:58:31.821096 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.821341 kubelet[2547]: E0209 18:58:31.821330 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.821427 kubelet[2547]: W0209 18:58:31.821415 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.821785 kubelet[2547]: E0209 18:58:31.821772 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.822102 kubelet[2547]: E0209 18:58:31.822089 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.822185 kubelet[2547]: W0209 18:58:31.822172 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.822271 kubelet[2547]: E0209 18:58:31.822240 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.910985 kubelet[2547]: E0209 18:58:31.910907 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.911121 kubelet[2547]: W0209 18:58:31.911105 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.911189 kubelet[2547]: E0209 18:58:31.911176 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.918200 kubelet[2547]: E0209 18:58:31.918182 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.918343 kubelet[2547]: W0209 18:58:31.918330 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.918450 kubelet[2547]: E0209 18:58:31.918441 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:31.918744 kubelet[2547]: E0209 18:58:31.918732 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:31.918826 kubelet[2547]: W0209 18:58:31.918815 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:31.918883 kubelet[2547]: E0209 18:58:31.918874 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.020119 kubelet[2547]: E0209 18:58:32.020094 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.020308 kubelet[2547]: W0209 18:58:32.020293 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.020387 kubelet[2547]: E0209 18:58:32.020376 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.021586 kubelet[2547]: E0209 18:58:32.021575 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.021670 kubelet[2547]: W0209 18:58:32.021658 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.021725 kubelet[2547]: E0209 18:58:32.021717 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.108740 kubelet[2547]: E0209 18:58:32.108711 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.108740 kubelet[2547]: W0209 18:58:32.108733 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.108907 kubelet[2547]: E0209 18:58:32.108751 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.125326 kubelet[2547]: E0209 18:58:32.125300 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.125484 kubelet[2547]: W0209 18:58:32.125468 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.125551 kubelet[2547]: E0209 18:58:32.125541 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.226513 kubelet[2547]: E0209 18:58:32.226414 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.226513 kubelet[2547]: W0209 18:58:32.226436 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.226513 kubelet[2547]: E0209 18:58:32.226456 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.327757 kubelet[2547]: E0209 18:58:32.327725 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.327757 kubelet[2547]: W0209 18:58:32.327748 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.327757 kubelet[2547]: E0209 18:58:32.327769 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.414968 systemd[1]: run-containerd-runc-k8s.io-d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9-runc.l70PVG.mount: Deactivated successfully. Feb 9 18:58:32.428614 kubelet[2547]: E0209 18:58:32.428589 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.428754 kubelet[2547]: W0209 18:58:32.428739 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.428830 kubelet[2547]: E0209 18:58:32.428820 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.517000 audit[3109]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:32.517000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffdab449a0 a2=0 a3=ffffbc7d36c0 items=0 ppid=2745 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:32.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:32.518000 audit[3109]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=3109 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:32.518000 audit[3109]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffdab449a0 a2=0 a3=ffffbc7d36c0 items=0 ppid=2745 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:32.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:32.529301 kubelet[2547]: E0209 18:58:32.529276 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.529301 kubelet[2547]: W0209 18:58:32.529298 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.529420 kubelet[2547]: E0209 18:58:32.529318 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.608344 kubelet[2547]: E0209 18:58:32.608305 2547 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition Feb 9 18:58:32.608474 kubelet[2547]: E0209 18:58:32.608409 2547 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs podName:5c3ef883-e8df-40ba-b38c-6221e35c2faf nodeName:}" failed. No retries permitted until 2024-02-09 18:58:33.108387363 +0000 UTC m=+21.455917178 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs") pod "calico-node-tfsbs" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf") : failed to sync secret cache: timed out waiting for the condition Feb 9 18:58:32.629887 kubelet[2547]: E0209 18:58:32.629857 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.629887 kubelet[2547]: W0209 18:58:32.629880 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.630053 kubelet[2547]: E0209 18:58:32.629904 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.730349 kubelet[2547]: E0209 18:58:32.730324 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.730507 kubelet[2547]: W0209 18:58:32.730493 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.730573 kubelet[2547]: E0209 18:58:32.730563 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.832482 kubelet[2547]: E0209 18:58:32.832404 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.832630 kubelet[2547]: W0209 18:58:32.832604 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.832707 kubelet[2547]: E0209 18:58:32.832696 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:32.870689 kubelet[2547]: E0209 18:58:32.870655 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:32.933625 kubelet[2547]: E0209 18:58:32.933601 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:32.933760 kubelet[2547]: W0209 18:58:32.933745 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:32.933840 kubelet[2547]: E0209 18:58:32.933829 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.035159 kubelet[2547]: E0209 18:58:33.035069 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.035159 kubelet[2547]: W0209 18:58:33.035090 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.035159 kubelet[2547]: E0209 18:58:33.035117 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.135867 kubelet[2547]: E0209 18:58:33.135603 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.135867 kubelet[2547]: W0209 18:58:33.135630 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.135867 kubelet[2547]: E0209 18:58:33.135651 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.136278 kubelet[2547]: E0209 18:58:33.136082 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.136278 kubelet[2547]: W0209 18:58:33.136093 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.136278 kubelet[2547]: E0209 18:58:33.136106 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.136563 kubelet[2547]: E0209 18:58:33.136448 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.136563 kubelet[2547]: W0209 18:58:33.136460 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.136563 kubelet[2547]: E0209 18:58:33.136472 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.136889 kubelet[2547]: E0209 18:58:33.136717 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.136889 kubelet[2547]: W0209 18:58:33.136727 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.136889 kubelet[2547]: E0209 18:58:33.136739 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.138506 kubelet[2547]: E0209 18:58:33.137038 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.138506 kubelet[2547]: W0209 18:58:33.137048 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.138506 kubelet[2547]: E0209 18:58:33.137061 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.143972 kubelet[2547]: E0209 18:58:33.143956 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:33.144080 kubelet[2547]: W0209 18:58:33.144068 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:33.144162 kubelet[2547]: E0209 18:58:33.144152 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:33.194175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1621509748.mount: Deactivated successfully. Feb 9 18:58:33.222346 env[1381]: time="2024-02-09T18:58:33.222304352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tfsbs,Uid:5c3ef883-e8df-40ba-b38c-6221e35c2faf,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:33.294754 env[1381]: time="2024-02-09T18:58:33.294683136Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:33.294893 env[1381]: time="2024-02-09T18:58:33.294758217Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:33.294893 env[1381]: time="2024-02-09T18:58:33.294795017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:33.295057 env[1381]: time="2024-02-09T18:58:33.295014140Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde pid=3131 runtime=io.containerd.runc.v2 Feb 9 18:58:33.320193 systemd[1]: Started cri-containerd-efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde.scope. Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.332000 audit: BPF prog-id=129 op=LOAD Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3131 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:33.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566616535343037623530396666646135303464336533323730313737 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3131 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:33.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566616535343037623530396666646135303464336533323730313737 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit: BPF prog-id=130 op=LOAD Feb 9 18:58:33.333000 audit[3141]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3131 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:33.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566616535343037623530396666646135303464336533323730313737 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit: BPF prog-id=131 op=LOAD Feb 9 18:58:33.333000 audit[3141]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3131 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:33.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566616535343037623530396666646135303464336533323730313737 Feb 9 18:58:33.333000 audit: BPF prog-id=131 op=UNLOAD Feb 9 18:58:33.333000 audit: BPF prog-id=130 op=UNLOAD Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:33.333000 audit: BPF prog-id=132 op=LOAD Feb 9 18:58:33.333000 audit[3141]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3131 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:33.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566616535343037623530396666646135303464336533323730313737 Feb 9 18:58:33.349024 env[1381]: time="2024-02-09T18:58:33.348979295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tfsbs,Uid:5c3ef883-e8df-40ba-b38c-6221e35c2faf,Namespace:calico-system,Attempt:0,} returns sandbox id \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\"" Feb 9 18:58:34.196000 audit[3190]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:34.196000 audit[3190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffca37d990 a2=0 a3=ffffb414c6c0 items=0 ppid=2745 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:34.197000 audit[3190]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:34.197000 audit[3190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffca37d990 a2=0 a3=ffffb414c6c0 items=0 ppid=2745 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:34.305432 env[1381]: time="2024-02-09T18:58:34.305383791Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:34.316139 env[1381]: time="2024-02-09T18:58:34.316081419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:34.324208 env[1381]: time="2024-02-09T18:58:34.324159381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:34.336554 env[1381]: time="2024-02-09T18:58:34.336503265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:34.337335 env[1381]: time="2024-02-09T18:58:34.337299193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 9 18:58:34.345840 env[1381]: time="2024-02-09T18:58:34.345795319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:58:34.352460 env[1381]: time="2024-02-09T18:58:34.352425266Z" level=info msg="CreateContainer within sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:58:34.430159 env[1381]: time="2024-02-09T18:58:34.430096930Z" level=info msg="CreateContainer within sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\"" Feb 9 18:58:34.430785 env[1381]: time="2024-02-09T18:58:34.430750256Z" level=info msg="StartContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\"" Feb 9 18:58:34.454716 systemd[1]: run-containerd-runc-k8s.io-6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad-runc.6v5eAR.mount: Deactivated successfully. Feb 9 18:58:34.463809 systemd[1]: Started cri-containerd-6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad.scope. Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.474000 audit: BPF prog-id=133 op=LOAD Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2996 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633036633165366261313233313433633362323635366238616530 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2996 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633036633165366261313233313433633362323635366238616530 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit: BPF prog-id=134 op=LOAD Feb 9 18:58:34.475000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2996 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633036633165366261313233313433633362323635366238616530 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit: BPF prog-id=135 op=LOAD Feb 9 18:58:34.475000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2996 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633036633165366261313233313433633362323635366238616530 Feb 9 18:58:34.475000 audit: BPF prog-id=135 op=UNLOAD Feb 9 18:58:34.475000 audit: BPF prog-id=134 op=UNLOAD Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:34.475000 audit: BPF prog-id=136 op=LOAD Feb 9 18:58:34.475000 audit[3203]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2996 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:34.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633036633165366261313233313433633362323635366238616530 Feb 9 18:58:34.513392 env[1381]: time="2024-02-09T18:58:34.513334570Z" level=info msg="StartContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" returns successfully" Feb 9 18:58:34.870913 kubelet[2547]: E0209 18:58:34.870810 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:34.952318 env[1381]: time="2024-02-09T18:58:34.952273640Z" level=info msg="StopContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" with timeout 300 (s)" Feb 9 18:58:34.952771 env[1381]: time="2024-02-09T18:58:34.952725005Z" level=info msg="Stop container \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" with signal terminated" Feb 9 18:58:34.971000 audit: BPF prog-id=133 op=UNLOAD Feb 9 18:58:34.971905 systemd[1]: cri-containerd-6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad.scope: Deactivated successfully. Feb 9 18:58:34.975000 audit: BPF prog-id=136 op=UNLOAD Feb 9 18:58:35.001412 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad-rootfs.mount: Deactivated successfully. Feb 9 18:58:35.737534 env[1381]: time="2024-02-09T18:58:35.737487630Z" level=info msg="shim disconnected" id=6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad Feb 9 18:58:35.737972 env[1381]: time="2024-02-09T18:58:35.737951234Z" level=warning msg="cleaning up after shim disconnected" id=6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad namespace=k8s.io Feb 9 18:58:35.738033 env[1381]: time="2024-02-09T18:58:35.738020715Z" level=info msg="cleaning up dead shim" Feb 9 18:58:35.746027 env[1381]: time="2024-02-09T18:58:35.745983394Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3253 runtime=io.containerd.runc.v2\n" Feb 9 18:58:35.757355 env[1381]: time="2024-02-09T18:58:35.757307066Z" level=info msg="StopContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" returns successfully" Feb 9 18:58:35.758061 env[1381]: time="2024-02-09T18:58:35.758034873Z" level=info msg="StopPodSandbox for \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\"" Feb 9 18:58:35.758203 env[1381]: time="2024-02-09T18:58:35.758183915Z" level=info msg="Container to stop \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 18:58:35.759920 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9-shm.mount: Deactivated successfully. Feb 9 18:58:35.768000 audit: BPF prog-id=125 op=UNLOAD Feb 9 18:58:35.768971 systemd[1]: cri-containerd-d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9.scope: Deactivated successfully. Feb 9 18:58:35.773000 audit: BPF prog-id=128 op=UNLOAD Feb 9 18:58:35.792951 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9-rootfs.mount: Deactivated successfully. Feb 9 18:58:35.810985 env[1381]: time="2024-02-09T18:58:35.810935278Z" level=info msg="shim disconnected" id=d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9 Feb 9 18:58:35.810985 env[1381]: time="2024-02-09T18:58:35.810983038Z" level=warning msg="cleaning up after shim disconnected" id=d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9 namespace=k8s.io Feb 9 18:58:35.811179 env[1381]: time="2024-02-09T18:58:35.810992798Z" level=info msg="cleaning up dead shim" Feb 9 18:58:35.820621 env[1381]: time="2024-02-09T18:58:35.819433002Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3285 runtime=io.containerd.runc.v2\n" Feb 9 18:58:35.820621 env[1381]: time="2024-02-09T18:58:35.819743805Z" level=info msg="TearDown network for sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" successfully" Feb 9 18:58:35.820621 env[1381]: time="2024-02-09T18:58:35.819765765Z" level=info msg="StopPodSandbox for \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" returns successfully" Feb 9 18:58:35.854860 kubelet[2547]: E0209 18:58:35.854829 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.854860 kubelet[2547]: W0209 18:58:35.854851 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.854860 kubelet[2547]: E0209 18:58:35.854871 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.855099 kubelet[2547]: I0209 18:58:35.854903 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-lnb2c\" (UniqueName: \"kubernetes.io/projected/07f865ee-c96d-4837-aaa4-901c963ee9ce-kube-api-access-lnb2c\") pod \"07f865ee-c96d-4837-aaa4-901c963ee9ce\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " Feb 9 18:58:35.855128 kubelet[2547]: E0209 18:58:35.855101 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.855128 kubelet[2547]: W0209 18:58:35.855111 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.855128 kubelet[2547]: E0209 18:58:35.855125 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.855195 kubelet[2547]: I0209 18:58:35.855145 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/07f865ee-c96d-4837-aaa4-901c963ee9ce-typha-certs\") pod \"07f865ee-c96d-4837-aaa4-901c963ee9ce\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " Feb 9 18:58:35.855365 kubelet[2547]: E0209 18:58:35.855350 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.855365 kubelet[2547]: W0209 18:58:35.855363 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.855448 kubelet[2547]: E0209 18:58:35.855380 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.855448 kubelet[2547]: I0209 18:58:35.855400 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07f865ee-c96d-4837-aaa4-901c963ee9ce-tigera-ca-bundle\") pod \"07f865ee-c96d-4837-aaa4-901c963ee9ce\" (UID: \"07f865ee-c96d-4837-aaa4-901c963ee9ce\") " Feb 9 18:58:35.856427 kubelet[2547]: E0209 18:58:35.855720 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.856427 kubelet[2547]: W0209 18:58:35.855735 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.856427 kubelet[2547]: E0209 18:58:35.855756 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.859426 systemd[1]: var-lib-kubelet-pods-07f865ee\x2dc96d\x2d4837\x2daaa4\x2d901c963ee9ce-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dlnb2c.mount: Deactivated successfully. Feb 9 18:58:35.860584 kubelet[2547]: I0209 18:58:35.860555 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/07f865ee-c96d-4837-aaa4-901c963ee9ce-kube-api-access-lnb2c" (OuterVolumeSpecName: "kube-api-access-lnb2c") pod "07f865ee-c96d-4837-aaa4-901c963ee9ce" (UID: "07f865ee-c96d-4837-aaa4-901c963ee9ce"). InnerVolumeSpecName "kube-api-access-lnb2c". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 18:58:35.861369 kubelet[2547]: E0209 18:58:35.861355 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.861469 kubelet[2547]: W0209 18:58:35.861455 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.861564 kubelet[2547]: E0209 18:58:35.861553 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.863081 systemd[1]: var-lib-kubelet-pods-07f865ee\x2dc96d\x2d4837\x2daaa4\x2d901c963ee9ce-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 9 18:58:35.865778 kubelet[2547]: E0209 18:58:35.865762 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:35.865902 kubelet[2547]: W0209 18:58:35.865889 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:35.865982 kubelet[2547]: E0209 18:58:35.865973 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:35.866148 kubelet[2547]: W0209 18:58:35.866137 2547 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/07f865ee-c96d-4837-aaa4-901c963ee9ce/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 18:58:35.866519 kubelet[2547]: I0209 18:58:35.866495 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/07f865ee-c96d-4837-aaa4-901c963ee9ce-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "07f865ee-c96d-4837-aaa4-901c963ee9ce" (UID: "07f865ee-c96d-4837-aaa4-901c963ee9ce"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 18:58:35.871052 systemd[1]: var-lib-kubelet-pods-07f865ee\x2dc96d\x2d4837\x2daaa4\x2d901c963ee9ce-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 9 18:58:35.871901 kubelet[2547]: I0209 18:58:35.871537 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/07f865ee-c96d-4837-aaa4-901c963ee9ce-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "07f865ee-c96d-4837-aaa4-901c963ee9ce" (UID: "07f865ee-c96d-4837-aaa4-901c963ee9ce"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 18:58:35.876722 systemd[1]: Removed slice kubepods-besteffort-pod07f865ee_c96d_4837_aaa4_901c963ee9ce.slice. Feb 9 18:58:35.953925 kubelet[2547]: I0209 18:58:35.953899 2547 scope.go:115] "RemoveContainer" containerID="6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad" Feb 9 18:58:35.955565 kubelet[2547]: I0209 18:58:35.955538 2547 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-lnb2c\" (UniqueName: \"kubernetes.io/projected/07f865ee-c96d-4837-aaa4-901c963ee9ce-kube-api-access-lnb2c\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:35.955696 kubelet[2547]: I0209 18:58:35.955685 2547 reconciler_common.go:295] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/07f865ee-c96d-4837-aaa4-901c963ee9ce-typha-certs\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:35.955786 kubelet[2547]: I0209 18:58:35.955777 2547 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/07f865ee-c96d-4837-aaa4-901c963ee9ce-tigera-ca-bundle\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:35.956235 env[1381]: time="2024-02-09T18:58:35.956201837Z" level=info msg="RemoveContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\"" Feb 9 18:58:35.970539 env[1381]: time="2024-02-09T18:58:35.970486259Z" level=info msg="RemoveContainer for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" returns successfully" Feb 9 18:58:35.972881 kubelet[2547]: I0209 18:58:35.972851 2547 scope.go:115] "RemoveContainer" containerID="6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad" Feb 9 18:58:35.973290 env[1381]: time="2024-02-09T18:58:35.973154485Z" level=error msg="ContainerStatus for \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\": not found" Feb 9 18:58:35.973673 kubelet[2547]: E0209 18:58:35.973637 2547 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\": not found" containerID="6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad" Feb 9 18:58:35.973738 kubelet[2547]: I0209 18:58:35.973684 2547 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad} err="failed to get container status \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\": rpc error: code = NotFound desc = an error occurred when try to find container \"6cc06c1e6ba123143c3b2656b8ae06c144947f4b715e308127647139dd4671ad\": not found" Feb 9 18:58:36.002999 kubelet[2547]: I0209 18:58:36.002881 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:36.003185 kubelet[2547]: E0209 18:58:36.003171 2547 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="07f865ee-c96d-4837-aaa4-901c963ee9ce" containerName="calico-typha" Feb 9 18:58:36.003304 kubelet[2547]: I0209 18:58:36.003292 2547 memory_manager.go:346] "RemoveStaleState removing state" podUID="07f865ee-c96d-4837-aaa4-901c963ee9ce" containerName="calico-typha" Feb 9 18:58:36.009638 systemd[1]: Created slice kubepods-besteffort-pod44de8d79_ed2b_4f6f_abcc_3866c8d33b28.slice. Feb 9 18:58:36.049507 kubelet[2547]: E0209 18:58:36.049471 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.049690 kubelet[2547]: W0209 18:58:36.049675 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.049773 kubelet[2547]: E0209 18:58:36.049763 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.050013 kubelet[2547]: E0209 18:58:36.050001 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.050104 kubelet[2547]: W0209 18:58:36.050092 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.050181 kubelet[2547]: E0209 18:58:36.050173 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.050440 kubelet[2547]: E0209 18:58:36.050429 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.050526 kubelet[2547]: W0209 18:58:36.050515 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.050598 kubelet[2547]: E0209 18:58:36.050588 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.050867 kubelet[2547]: E0209 18:58:36.050856 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.050963 kubelet[2547]: W0209 18:58:36.050952 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.051040 kubelet[2547]: E0209 18:58:36.051031 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.051267 kubelet[2547]: E0209 18:58:36.051255 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.051423 kubelet[2547]: W0209 18:58:36.051408 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.051506 kubelet[2547]: E0209 18:58:36.051495 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.051747 kubelet[2547]: E0209 18:58:36.051735 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.051876 kubelet[2547]: W0209 18:58:36.051864 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.051950 kubelet[2547]: E0209 18:58:36.051941 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.055989 kubelet[2547]: E0209 18:58:36.055961 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.056147 kubelet[2547]: W0209 18:58:36.056132 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.056231 kubelet[2547]: E0209 18:58:36.056221 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.056528 kubelet[2547]: E0209 18:58:36.056516 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.056623 kubelet[2547]: W0209 18:58:36.056611 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.056689 kubelet[2547]: E0209 18:58:36.056672 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.056910 kubelet[2547]: E0209 18:58:36.056899 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.056982 kubelet[2547]: W0209 18:58:36.056972 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.057052 kubelet[2547]: E0209 18:58:36.057032 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.058457 kubelet[2547]: E0209 18:58:36.058441 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.058567 kubelet[2547]: W0209 18:58:36.058554 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.058635 kubelet[2547]: E0209 18:58:36.058626 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.058719 kubelet[2547]: I0209 18:58:36.058708 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxbrz\" (UniqueName: \"kubernetes.io/projected/44de8d79-ed2b-4f6f-abcc-3866c8d33b28-kube-api-access-xxbrz\") pod \"calico-typha-6f7ccb9cc6-lv24n\" (UID: \"44de8d79-ed2b-4f6f-abcc-3866c8d33b28\") " pod="calico-system/calico-typha-6f7ccb9cc6-lv24n" Feb 9 18:58:36.058978 kubelet[2547]: E0209 18:58:36.058953 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.058978 kubelet[2547]: W0209 18:58:36.058968 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.059076 kubelet[2547]: E0209 18:58:36.058987 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.060376 kubelet[2547]: E0209 18:58:36.060349 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.060376 kubelet[2547]: W0209 18:58:36.060371 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.060500 kubelet[2547]: E0209 18:58:36.060398 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.060593 kubelet[2547]: E0209 18:58:36.060579 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.060593 kubelet[2547]: W0209 18:58:36.060590 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.060716 kubelet[2547]: E0209 18:58:36.060601 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.060716 kubelet[2547]: I0209 18:58:36.060628 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/44de8d79-ed2b-4f6f-abcc-3866c8d33b28-tigera-ca-bundle\") pod \"calico-typha-6f7ccb9cc6-lv24n\" (UID: \"44de8d79-ed2b-4f6f-abcc-3866c8d33b28\") " pod="calico-system/calico-typha-6f7ccb9cc6-lv24n" Feb 9 18:58:36.060953 kubelet[2547]: E0209 18:58:36.060936 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.060953 kubelet[2547]: W0209 18:58:36.060951 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.061044 kubelet[2547]: E0209 18:58:36.060972 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.061044 kubelet[2547]: I0209 18:58:36.060992 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/44de8d79-ed2b-4f6f-abcc-3866c8d33b28-typha-certs\") pod \"calico-typha-6f7ccb9cc6-lv24n\" (UID: \"44de8d79-ed2b-4f6f-abcc-3866c8d33b28\") " pod="calico-system/calico-typha-6f7ccb9cc6-lv24n" Feb 9 18:58:36.061147 kubelet[2547]: E0209 18:58:36.061134 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.061147 kubelet[2547]: W0209 18:58:36.061145 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.061206 kubelet[2547]: E0209 18:58:36.061156 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.061366 kubelet[2547]: E0209 18:58:36.061352 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.061366 kubelet[2547]: W0209 18:58:36.061365 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.061459 kubelet[2547]: E0209 18:58:36.061377 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.061564 kubelet[2547]: E0209 18:58:36.061550 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.061564 kubelet[2547]: W0209 18:58:36.061562 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.061625 kubelet[2547]: E0209 18:58:36.061572 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.061770 kubelet[2547]: E0209 18:58:36.061755 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.061770 kubelet[2547]: W0209 18:58:36.061767 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.061849 kubelet[2547]: E0209 18:58:36.061779 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.134000 audit[3350]: NETFILTER_CFG table=filter:115 family=2 entries=14 op=nft_register_rule pid=3350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.134000 audit[3350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffe4aede20 a2=0 a3=ffff812956c0 items=0 ppid=2745 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.135000 audit[3350]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=3350 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.135000 audit[3350]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffe4aede20 a2=0 a3=ffff812956c0 items=0 ppid=2745 pid=3350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.162685 kubelet[2547]: E0209 18:58:36.162659 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.162852 kubelet[2547]: W0209 18:58:36.162837 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.162920 kubelet[2547]: E0209 18:58:36.162910 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.163192 kubelet[2547]: E0209 18:58:36.163179 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.163305 kubelet[2547]: W0209 18:58:36.163292 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.163377 kubelet[2547]: E0209 18:58:36.163368 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.163677 kubelet[2547]: E0209 18:58:36.163665 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.163758 kubelet[2547]: W0209 18:58:36.163746 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.163834 kubelet[2547]: E0209 18:58:36.163824 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.164220 kubelet[2547]: E0209 18:58:36.164205 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.164402 kubelet[2547]: W0209 18:58:36.164386 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.164507 kubelet[2547]: E0209 18:58:36.164497 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.164804 kubelet[2547]: E0209 18:58:36.164793 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.164894 kubelet[2547]: W0209 18:58:36.164881 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.164965 kubelet[2547]: E0209 18:58:36.164954 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.165284 kubelet[2547]: E0209 18:58:36.165270 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.165375 kubelet[2547]: W0209 18:58:36.165364 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.165502 kubelet[2547]: E0209 18:58:36.165493 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.165667 kubelet[2547]: E0209 18:58:36.165657 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.165736 kubelet[2547]: W0209 18:58:36.165725 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.165919 kubelet[2547]: E0209 18:58:36.165894 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.166088 kubelet[2547]: E0209 18:58:36.166076 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.166152 kubelet[2547]: W0209 18:58:36.166142 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.166367 kubelet[2547]: E0209 18:58:36.166354 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.166530 kubelet[2547]: E0209 18:58:36.166520 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.166596 kubelet[2547]: W0209 18:58:36.166586 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.166665 kubelet[2547]: E0209 18:58:36.166655 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.167550 kubelet[2547]: E0209 18:58:36.167533 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.167642 kubelet[2547]: W0209 18:58:36.167631 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.167711 kubelet[2547]: E0209 18:58:36.167701 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.168154 kubelet[2547]: E0209 18:58:36.168134 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.168154 kubelet[2547]: W0209 18:58:36.168150 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.168268 kubelet[2547]: E0209 18:58:36.168170 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.168965 kubelet[2547]: E0209 18:58:36.168944 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.168965 kubelet[2547]: W0209 18:58:36.168963 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.169099 kubelet[2547]: E0209 18:58:36.169086 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.170812 kubelet[2547]: E0209 18:58:36.170787 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.170812 kubelet[2547]: W0209 18:58:36.170808 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.170971 kubelet[2547]: E0209 18:58:36.170957 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.172305 kubelet[2547]: E0209 18:58:36.172263 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.172305 kubelet[2547]: W0209 18:58:36.172281 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.172439 kubelet[2547]: E0209 18:58:36.172426 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.173331 kubelet[2547]: E0209 18:58:36.173299 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.173331 kubelet[2547]: W0209 18:58:36.173320 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.173478 kubelet[2547]: E0209 18:58:36.173465 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.173633 kubelet[2547]: E0209 18:58:36.173484 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.173690 kubelet[2547]: W0209 18:58:36.173634 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.173690 kubelet[2547]: E0209 18:58:36.173652 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.176822 kubelet[2547]: E0209 18:58:36.176803 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.176926 kubelet[2547]: W0209 18:58:36.176913 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.176991 kubelet[2547]: E0209 18:58:36.176982 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.187278 kubelet[2547]: E0209 18:58:36.187238 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.187438 kubelet[2547]: W0209 18:58:36.187424 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.187516 kubelet[2547]: E0209 18:58:36.187506 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.195000 audit[3396]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=3396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.215053 kernel: kauditd_printk_skb: 195 callbacks suppressed Feb 9 18:58:36.215128 kernel: audit: type=1325 audit(1707505116.195:1125): table=filter:117 family=2 entries=14 op=nft_register_rule pid=3396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.195000 audit[3396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffffe0e5280 a2=0 a3=ffffa87c66c0 items=0 ppid=2745 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.243772 kernel: audit: type=1300 audit(1707505116.195:1125): arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=fffffe0e5280 a2=0 a3=ffffa87c66c0 items=0 ppid=2745 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.258599 kernel: audit: type=1327 audit(1707505116.195:1125): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.195000 audit[3396]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=3396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.274421 kernel: audit: type=1325 audit(1707505116.195:1126): table=nat:118 family=2 entries=20 op=nft_register_rule pid=3396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:36.195000 audit[3396]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffffe0e5280 a2=0 a3=ffffa87c66c0 items=0 ppid=2745 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.303789 kernel: audit: type=1300 audit(1707505116.195:1126): arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=fffffe0e5280 a2=0 a3=ffffa87c66c0 items=0 ppid=2745 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.319849 kernel: audit: type=1327 audit(1707505116.195:1126): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:36.320815 env[1381]: time="2024-02-09T18:58:36.320546030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f7ccb9cc6-lv24n,Uid:44de8d79-ed2b-4f6f-abcc-3866c8d33b28,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:36.409853 env[1381]: time="2024-02-09T18:58:36.409779379Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:36.409853 env[1381]: time="2024-02-09T18:58:36.409819699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:36.409853 env[1381]: time="2024-02-09T18:58:36.409829579Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:36.410290 env[1381]: time="2024-02-09T18:58:36.410229183Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4e9d062d5b128d153d2b86e199eb316155f2ab0bd88f74dd2ec5706eb0e6f82 pid=3405 runtime=io.containerd.runc.v2 Feb 9 18:58:36.436505 systemd[1]: Started cri-containerd-d4e9d062d5b128d153d2b86e199eb316155f2ab0bd88f74dd2ec5706eb0e6f82.scope. Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495335 kernel: audit: type=1400 audit(1707505116.452:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495494 kernel: audit: type=1400 audit(1707505116.452:1128): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.515819 kernel: audit: type=1400 audit(1707505116.452:1129): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.534434 kernel: audit: type=1400 audit(1707505116.452:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.484000 audit: BPF prog-id=137 op=LOAD Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3405 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653964303632643562313238643135336432623836653139396562 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3405 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653964303632643562313238643135336432623836653139396562 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.495000 audit: BPF prog-id=138 op=LOAD Feb 9 18:58:36.495000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3405 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653964303632643562313238643135336432623836653139396562 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit: BPF prog-id=139 op=LOAD Feb 9 18:58:36.496000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3405 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653964303632643562313238643135336432623836653139396562 Feb 9 18:58:36.496000 audit: BPF prog-id=139 op=UNLOAD Feb 9 18:58:36.496000 audit: BPF prog-id=138 op=UNLOAD Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { perfmon } for pid=3416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit[3416]: AVC avc: denied { bpf } for pid=3416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.496000 audit: BPF prog-id=140 op=LOAD Feb 9 18:58:36.496000 audit[3416]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3405 pid=3416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434653964303632643562313238643135336432623836653139396562 Feb 9 18:58:36.554233 env[1381]: time="2024-02-09T18:58:36.554195184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6f7ccb9cc6-lv24n,Uid:44de8d79-ed2b-4f6f-abcc-3866c8d33b28,Namespace:calico-system,Attempt:0,} returns sandbox id \"d4e9d062d5b128d153d2b86e199eb316155f2ab0bd88f74dd2ec5706eb0e6f82\"" Feb 9 18:58:36.561737 env[1381]: time="2024-02-09T18:58:36.561698337Z" level=info msg="CreateContainer within sandbox \"d4e9d062d5b128d153d2b86e199eb316155f2ab0bd88f74dd2ec5706eb0e6f82\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 18:58:36.657394 env[1381]: time="2024-02-09T18:58:36.657333988Z" level=info msg="CreateContainer within sandbox \"d4e9d062d5b128d153d2b86e199eb316155f2ab0bd88f74dd2ec5706eb0e6f82\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8e935a6be00e57aaa42666a868e346b99c45a1b70d964d901fec9ccb2e73ee19\"" Feb 9 18:58:36.659614 env[1381]: time="2024-02-09T18:58:36.659493489Z" level=info msg="StartContainer for \"8e935a6be00e57aaa42666a868e346b99c45a1b70d964d901fec9ccb2e73ee19\"" Feb 9 18:58:36.683039 systemd[1]: Started cri-containerd-8e935a6be00e57aaa42666a868e346b99c45a1b70d964d901fec9ccb2e73ee19.scope. Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.698000 audit: BPF prog-id=141 op=LOAD Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3405 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393335613662653030653537616161343236363661383638653334 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3405 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393335613662653030653537616161343236363661383638653334 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.699000 audit: BPF prog-id=142 op=LOAD Feb 9 18:58:36.699000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3405 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393335613662653030653537616161343236363661383638653334 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.700000 audit: BPF prog-id=143 op=LOAD Feb 9 18:58:36.700000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3405 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393335613662653030653537616161343236363661383638653334 Feb 9 18:58:36.701000 audit: BPF prog-id=143 op=UNLOAD Feb 9 18:58:36.701000 audit: BPF prog-id=142 op=UNLOAD Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { perfmon } for pid=3447 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit[3447]: AVC avc: denied { bpf } for pid=3447 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:36.701000 audit: BPF prog-id=144 op=LOAD Feb 9 18:58:36.701000 audit[3447]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3405 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:36.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393335613662653030653537616161343236363661383638653334 Feb 9 18:58:36.736083 env[1381]: time="2024-02-09T18:58:36.736030914Z" level=info msg="StartContainer for \"8e935a6be00e57aaa42666a868e346b99c45a1b70d964d901fec9ccb2e73ee19\" returns successfully" Feb 9 18:58:36.874633 kubelet[2547]: E0209 18:58:36.871476 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:36.932944 env[1381]: time="2024-02-09T18:58:36.932902909Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:36.942347 env[1381]: time="2024-02-09T18:58:36.942305001Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:36.949429 env[1381]: time="2024-02-09T18:58:36.949392830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:36.958116 env[1381]: time="2024-02-09T18:58:36.958078154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:36.958872 env[1381]: time="2024-02-09T18:58:36.958846402Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 18:58:36.962518 env[1381]: time="2024-02-09T18:58:36.962487717Z" level=info msg="CreateContainer within sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:58:36.972302 kubelet[2547]: I0209 18:58:36.972257 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6f7ccb9cc6-lv24n" podStartSLOduration=3.972206692 pod.CreationTimestamp="2024-02-09 18:58:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:36.97097772 +0000 UTC m=+25.318507575" watchObservedRunningTime="2024-02-09 18:58:36.972206692 +0000 UTC m=+25.319736547" Feb 9 18:58:36.976540 kubelet[2547]: E0209 18:58:36.976400 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.976540 kubelet[2547]: W0209 18:58:36.976419 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.976540 kubelet[2547]: E0209 18:58:36.976448 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.976876 kubelet[2547]: E0209 18:58:36.976765 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.976876 kubelet[2547]: W0209 18:58:36.976776 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.976876 kubelet[2547]: E0209 18:58:36.976789 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.977197 kubelet[2547]: E0209 18:58:36.977039 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.977197 kubelet[2547]: W0209 18:58:36.977049 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.977197 kubelet[2547]: E0209 18:58:36.977061 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.977645 kubelet[2547]: E0209 18:58:36.977456 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.977645 kubelet[2547]: W0209 18:58:36.977468 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.977645 kubelet[2547]: E0209 18:58:36.977480 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.977979 kubelet[2547]: E0209 18:58:36.977864 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.977979 kubelet[2547]: W0209 18:58:36.977878 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.977979 kubelet[2547]: E0209 18:58:36.977897 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.978294 kubelet[2547]: E0209 18:58:36.978170 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.978294 kubelet[2547]: W0209 18:58:36.978188 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.978294 kubelet[2547]: E0209 18:58:36.978202 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.978593 kubelet[2547]: E0209 18:58:36.978575 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.978593 kubelet[2547]: W0209 18:58:36.978591 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.978683 kubelet[2547]: E0209 18:58:36.978608 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.978831 kubelet[2547]: E0209 18:58:36.978816 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.978831 kubelet[2547]: W0209 18:58:36.978828 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.978914 kubelet[2547]: E0209 18:58:36.978839 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.979044 kubelet[2547]: E0209 18:58:36.979031 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.979044 kubelet[2547]: W0209 18:58:36.979041 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.979129 kubelet[2547]: E0209 18:58:36.979050 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.979283 kubelet[2547]: E0209 18:58:36.979269 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.979283 kubelet[2547]: W0209 18:58:36.979280 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.979363 kubelet[2547]: E0209 18:58:36.979290 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.979503 kubelet[2547]: E0209 18:58:36.979489 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.979503 kubelet[2547]: W0209 18:58:36.979501 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.979590 kubelet[2547]: E0209 18:58:36.979512 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:36.979721 kubelet[2547]: E0209 18:58:36.979710 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:36.979721 kubelet[2547]: W0209 18:58:36.979719 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:36.979779 kubelet[2547]: E0209 18:58:36.979730 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.017082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1662802330.mount: Deactivated successfully. Feb 9 18:58:37.047665 env[1381]: time="2024-02-09T18:58:37.047612577Z" level=info msg="CreateContainer within sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\"" Feb 9 18:58:37.048488 env[1381]: time="2024-02-09T18:58:37.048457106Z" level=info msg="StartContainer for \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\"" Feb 9 18:58:37.076111 systemd[1]: Started cri-containerd-e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807.scope. Feb 9 18:58:37.080122 kubelet[2547]: E0209 18:58:37.080090 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.080122 kubelet[2547]: W0209 18:58:37.080112 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.080332 kubelet[2547]: E0209 18:58:37.080133 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.081761 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.082788 kubelet[2547]: W0209 18:58:37.081778 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.081801 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.081969 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.082788 kubelet[2547]: W0209 18:58:37.081976 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.081986 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.082128 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.082788 kubelet[2547]: W0209 18:58:37.082136 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.082144 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.082788 kubelet[2547]: E0209 18:58:37.082289 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.083093 kubelet[2547]: W0209 18:58:37.082297 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.083093 kubelet[2547]: E0209 18:58:37.082308 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.083093 kubelet[2547]: E0209 18:58:37.082422 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.083093 kubelet[2547]: W0209 18:58:37.082428 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.083093 kubelet[2547]: E0209 18:58:37.082437 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.083093 kubelet[2547]: E0209 18:58:37.082568 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.083093 kubelet[2547]: W0209 18:58:37.082574 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.083093 kubelet[2547]: E0209 18:58:37.082583 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.084335 kubelet[2547]: E0209 18:58:37.084312 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.084335 kubelet[2547]: W0209 18:58:37.084331 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.084522 kubelet[2547]: E0209 18:58:37.084482 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.084522 kubelet[2547]: E0209 18:58:37.084511 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.084522 kubelet[2547]: W0209 18:58:37.084520 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.084766 kubelet[2547]: E0209 18:58:37.084639 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.084766 kubelet[2547]: E0209 18:58:37.084642 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.084766 kubelet[2547]: W0209 18:58:37.084676 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.084766 kubelet[2547]: E0209 18:58:37.084688 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.085605 kubelet[2547]: E0209 18:58:37.085521 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.085605 kubelet[2547]: W0209 18:58:37.085545 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.085605 kubelet[2547]: E0209 18:58:37.085568 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.086231 kubelet[2547]: E0209 18:58:37.086109 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.086231 kubelet[2547]: W0209 18:58:37.086182 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.086492 kubelet[2547]: E0209 18:58:37.086394 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.086700 kubelet[2547]: E0209 18:58:37.086599 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.086700 kubelet[2547]: W0209 18:58:37.086611 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.086700 kubelet[2547]: E0209 18:58:37.086627 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.086988 kubelet[2547]: E0209 18:58:37.086869 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.086988 kubelet[2547]: W0209 18:58:37.086879 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.086988 kubelet[2547]: E0209 18:58:37.086899 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.087347 kubelet[2547]: E0209 18:58:37.087151 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.087347 kubelet[2547]: W0209 18:58:37.087161 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.087347 kubelet[2547]: E0209 18:58:37.087180 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.087480 kubelet[2547]: E0209 18:58:37.087407 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.087480 kubelet[2547]: W0209 18:58:37.087418 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.087480 kubelet[2547]: E0209 18:58:37.087437 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.087734 kubelet[2547]: E0209 18:58:37.087718 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.087734 kubelet[2547]: W0209 18:58:37.087731 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.087824 kubelet[2547]: E0209 18:58:37.087750 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.087900 kubelet[2547]: E0209 18:58:37.087886 2547 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:58:37.087900 kubelet[2547]: W0209 18:58:37.087897 2547 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:58:37.088005 kubelet[2547]: E0209 18:58:37.087907 2547 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3131 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616166613839643539336531383737383833373937653463376532 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit: BPF prog-id=145 op=LOAD Feb 9 18:58:37.095000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3131 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616166613839643539336531383737383833373937653463376532 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.095000 audit: BPF prog-id=146 op=LOAD Feb 9 18:58:37.095000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3131 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:37.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616166613839643539336531383737383833373937653463376532 Feb 9 18:58:37.095000 audit: BPF prog-id=146 op=UNLOAD Feb 9 18:58:37.096000 audit: BPF prog-id=145 op=UNLOAD Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:37.096000 audit: BPF prog-id=147 op=LOAD Feb 9 18:58:37.096000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3131 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:37.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616166613839643539336531383737383833373937653463376532 Feb 9 18:58:37.116747 systemd[1]: cri-containerd-e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807.scope: Deactivated successfully. Feb 9 18:58:37.117981 env[1381]: time="2024-02-09T18:58:37.117930650Z" level=info msg="StartContainer for \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\" returns successfully" Feb 9 18:58:37.120000 audit: BPF prog-id=147 op=UNLOAD Feb 9 18:58:37.242754 env[1381]: time="2024-02-09T18:58:37.242700762Z" level=info msg="shim disconnected" id=e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807 Feb 9 18:58:37.242754 env[1381]: time="2024-02-09T18:58:37.242748523Z" level=warning msg="cleaning up after shim disconnected" id=e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807 namespace=k8s.io Feb 9 18:58:37.242754 env[1381]: time="2024-02-09T18:58:37.242758523Z" level=info msg="cleaning up dead shim" Feb 9 18:58:37.254281 env[1381]: time="2024-02-09T18:58:37.254215592Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3556 runtime=io.containerd.runc.v2\n" Feb 9 18:58:37.760106 systemd[1]: run-containerd-runc-k8s.io-e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807-runc.z1SsVw.mount: Deactivated successfully. Feb 9 18:58:37.760200 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807-rootfs.mount: Deactivated successfully. Feb 9 18:58:37.873764 kubelet[2547]: I0209 18:58:37.873740 2547 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=07f865ee-c96d-4837-aaa4-901c963ee9ce path="/var/lib/kubelet/pods/07f865ee-c96d-4837-aaa4-901c963ee9ce/volumes" Feb 9 18:58:37.960431 kubelet[2547]: I0209 18:58:37.960399 2547 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:58:37.961215 env[1381]: time="2024-02-09T18:58:37.961176230Z" level=info msg="StopPodSandbox for \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\"" Feb 9 18:58:37.961501 env[1381]: time="2024-02-09T18:58:37.961263671Z" level=info msg="Container to stop \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 18:58:37.962940 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde-shm.mount: Deactivated successfully. Feb 9 18:58:37.970598 systemd[1]: cri-containerd-efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde.scope: Deactivated successfully. Feb 9 18:58:37.970000 audit: BPF prog-id=129 op=UNLOAD Feb 9 18:58:37.974000 audit: BPF prog-id=132 op=UNLOAD Feb 9 18:58:37.995703 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde-rootfs.mount: Deactivated successfully. Feb 9 18:58:38.023148 env[1381]: time="2024-02-09T18:58:38.023019377Z" level=info msg="shim disconnected" id=efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde Feb 9 18:58:38.023148 env[1381]: time="2024-02-09T18:58:38.023081218Z" level=warning msg="cleaning up after shim disconnected" id=efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde namespace=k8s.io Feb 9 18:58:38.023148 env[1381]: time="2024-02-09T18:58:38.023091538Z" level=info msg="cleaning up dead shim" Feb 9 18:58:38.031566 env[1381]: time="2024-02-09T18:58:38.030285326Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3592 runtime=io.containerd.runc.v2\n" Feb 9 18:58:38.031566 env[1381]: time="2024-02-09T18:58:38.030593248Z" level=info msg="TearDown network for sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" successfully" Feb 9 18:58:38.031566 env[1381]: time="2024-02-09T18:58:38.030614129Z" level=info msg="StopPodSandbox for \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" returns successfully" Feb 9 18:58:38.188100 kubelet[2547]: I0209 18:58:38.188054 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-net-dir\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188100 kubelet[2547]: I0209 18:58:38.188099 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-xtables-lock\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188124 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c3ef883-e8df-40ba-b38c-6221e35c2faf-tigera-ca-bundle\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188145 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-lib-calico\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188164 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-run-calico\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188187 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188202 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-log-dir\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188352 kubelet[2547]: I0209 18:58:38.188220 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-lib-modules\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188493 kubelet[2547]: I0209 18:58:38.188238 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-bin-dir\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188493 kubelet[2547]: I0209 18:58:38.188276 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-flexvol-driver-host\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188493 kubelet[2547]: I0209 18:58:38.188299 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k2vb4\" (UniqueName: \"kubernetes.io/projected/5c3ef883-e8df-40ba-b38c-6221e35c2faf-kube-api-access-k2vb4\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188493 kubelet[2547]: I0209 18:58:38.188317 2547 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-policysync\") pod \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\" (UID: \"5c3ef883-e8df-40ba-b38c-6221e35c2faf\") " Feb 9 18:58:38.188493 kubelet[2547]: I0209 18:58:38.188382 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-policysync" (OuterVolumeSpecName: "policysync") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.188608 kubelet[2547]: I0209 18:58:38.188417 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.188608 kubelet[2547]: I0209 18:58:38.188432 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.188657 kubelet[2547]: W0209 18:58:38.188593 2547 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/5c3ef883-e8df-40ba-b38c-6221e35c2faf/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 18:58:38.189125 kubelet[2547]: I0209 18:58:38.188717 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.189125 kubelet[2547]: I0209 18:58:38.188749 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.189125 kubelet[2547]: I0209 18:58:38.188776 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/5c3ef883-e8df-40ba-b38c-6221e35c2faf-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 18:58:38.189125 kubelet[2547]: I0209 18:58:38.188792 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.189125 kubelet[2547]: I0209 18:58:38.188798 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.189409 kubelet[2547]: I0209 18:58:38.188815 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.189409 kubelet[2547]: I0209 18:58:38.188832 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 18:58:38.195149 kubelet[2547]: I0209 18:58:38.191892 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs" (OuterVolumeSpecName: "node-certs") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 18:58:38.192857 systemd[1]: var-lib-kubelet-pods-5c3ef883\x2de8df\x2d40ba\x2db38c\x2d6221e35c2faf-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 9 18:58:38.194682 systemd[1]: var-lib-kubelet-pods-5c3ef883\x2de8df\x2d40ba\x2db38c\x2d6221e35c2faf-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk2vb4.mount: Deactivated successfully. Feb 9 18:58:38.195683 kubelet[2547]: I0209 18:58:38.195647 2547 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/5c3ef883-e8df-40ba-b38c-6221e35c2faf-kube-api-access-k2vb4" (OuterVolumeSpecName: "kube-api-access-k2vb4") pod "5c3ef883-e8df-40ba-b38c-6221e35c2faf" (UID: "5c3ef883-e8df-40ba-b38c-6221e35c2faf"). InnerVolumeSpecName "kube-api-access-k2vb4". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 18:58:38.288599 kubelet[2547]: I0209 18:58:38.288493 2547 reconciler_common.go:295] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-policysync\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.288776 kubelet[2547]: I0209 18:58:38.288764 2547 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-k2vb4\" (UniqueName: \"kubernetes.io/projected/5c3ef883-e8df-40ba-b38c-6221e35c2faf-kube-api-access-k2vb4\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.288856 kubelet[2547]: I0209 18:58:38.288847 2547 reconciler_common.go:295] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-net-dir\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.288930 kubelet[2547]: I0209 18:58:38.288923 2547 reconciler_common.go:295] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-xtables-lock\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289011 kubelet[2547]: I0209 18:58:38.289003 2547 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5c3ef883-e8df-40ba-b38c-6221e35c2faf-tigera-ca-bundle\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289077 kubelet[2547]: I0209 18:58:38.289069 2547 reconciler_common.go:295] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-lib-calico\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289147 kubelet[2547]: I0209 18:58:38.289128 2547 reconciler_common.go:295] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-var-run-calico\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289216 kubelet[2547]: I0209 18:58:38.289200 2547 reconciler_common.go:295] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5c3ef883-e8df-40ba-b38c-6221e35c2faf-node-certs\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289304 kubelet[2547]: I0209 18:58:38.289296 2547 reconciler_common.go:295] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-lib-modules\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289383 kubelet[2547]: I0209 18:58:38.289375 2547 reconciler_common.go:295] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-bin-dir\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289461 kubelet[2547]: I0209 18:58:38.289453 2547 reconciler_common.go:295] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-cni-log-dir\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.289533 kubelet[2547]: I0209 18:58:38.289524 2547 reconciler_common.go:295] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5c3ef883-e8df-40ba-b38c-6221e35c2faf-flexvol-driver-host\") on node \"ci-3510.3.2-a-71d57399a1\" DevicePath \"\"" Feb 9 18:58:38.871680 kubelet[2547]: E0209 18:58:38.871654 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:38.963601 kubelet[2547]: I0209 18:58:38.963565 2547 scope.go:115] "RemoveContainer" containerID="e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807" Feb 9 18:58:38.967297 env[1381]: time="2024-02-09T18:58:38.967238725Z" level=info msg="RemoveContainer for \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\"" Feb 9 18:58:38.968218 systemd[1]: Removed slice kubepods-besteffort-pod5c3ef883_e8df_40ba_b38c_6221e35c2faf.slice. Feb 9 18:58:38.981666 env[1381]: time="2024-02-09T18:58:38.981526859Z" level=info msg="RemoveContainer for \"e3aafa89d593e1877883797e4c7e2f69d2351d2f834261e8c5e2885d9df4a807\" returns successfully" Feb 9 18:58:39.003703 kubelet[2547]: I0209 18:58:39.003652 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:39.003871 kubelet[2547]: E0209 18:58:39.003731 2547 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="5c3ef883-e8df-40ba-b38c-6221e35c2faf" containerName="flexvol-driver" Feb 9 18:58:39.003871 kubelet[2547]: I0209 18:58:39.003765 2547 memory_manager.go:346] "RemoveStaleState removing state" podUID="5c3ef883-e8df-40ba-b38c-6221e35c2faf" containerName="flexvol-driver" Feb 9 18:58:39.013977 systemd[1]: Created slice kubepods-besteffort-podd73a0299_701b_4363_ac5d_75f6910dcb1c.slice. Feb 9 18:58:39.193372 kubelet[2547]: I0209 18:58:39.193331 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/d73a0299-701b-4363-ac5d-75f6910dcb1c-node-certs\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193372 kubelet[2547]: I0209 18:58:39.193379 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-var-lib-calico\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193569 kubelet[2547]: I0209 18:58:39.193401 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-lib-modules\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193569 kubelet[2547]: I0209 18:58:39.193422 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-policysync\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193569 kubelet[2547]: I0209 18:58:39.193443 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d73a0299-701b-4363-ac5d-75f6910dcb1c-tigera-ca-bundle\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193569 kubelet[2547]: I0209 18:58:39.193463 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-cni-log-dir\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193569 kubelet[2547]: I0209 18:58:39.193484 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jdnvp\" (UniqueName: \"kubernetes.io/projected/d73a0299-701b-4363-ac5d-75f6910dcb1c-kube-api-access-jdnvp\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193714 kubelet[2547]: I0209 18:58:39.193504 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-xtables-lock\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193714 kubelet[2547]: I0209 18:58:39.193522 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-cni-net-dir\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193714 kubelet[2547]: I0209 18:58:39.193542 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-var-run-calico\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193714 kubelet[2547]: I0209 18:58:39.193567 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-cni-bin-dir\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.193714 kubelet[2547]: I0209 18:58:39.193586 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/d73a0299-701b-4363-ac5d-75f6910dcb1c-flexvol-driver-host\") pod \"calico-node-pzdzp\" (UID: \"d73a0299-701b-4363-ac5d-75f6910dcb1c\") " pod="calico-system/calico-node-pzdzp" Feb 9 18:58:39.319167 env[1381]: time="2024-02-09T18:58:39.319122378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pzdzp,Uid:d73a0299-701b-4363-ac5d-75f6910dcb1c,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:39.372181 env[1381]: time="2024-02-09T18:58:39.372097227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:39.372406 env[1381]: time="2024-02-09T18:58:39.372381990Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:39.372503 env[1381]: time="2024-02-09T18:58:39.372481871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:39.372769 env[1381]: time="2024-02-09T18:58:39.372741273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6 pid=3617 runtime=io.containerd.runc.v2 Feb 9 18:58:39.391035 systemd[1]: Started cri-containerd-70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6.scope. Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.400000 audit: BPF prog-id=148 op=LOAD Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3617 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730616463383564313730383335323133643365343561316566633531 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3617 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730616463383564313730383335323133643365343561316566633531 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit: BPF prog-id=149 op=LOAD Feb 9 18:58:39.401000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3617 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730616463383564313730383335323133643365343561316566633531 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit: BPF prog-id=150 op=LOAD Feb 9 18:58:39.401000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3617 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730616463383564313730383335323133643365343561316566633531 Feb 9 18:58:39.401000 audit: BPF prog-id=150 op=UNLOAD Feb 9 18:58:39.401000 audit: BPF prog-id=149 op=UNLOAD Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { perfmon } for pid=3628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit[3628]: AVC avc: denied { bpf } for pid=3628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.401000 audit: BPF prog-id=151 op=LOAD Feb 9 18:58:39.401000 audit[3628]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3617 pid=3628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730616463383564313730383335323133643365343561316566633531 Feb 9 18:58:39.414724 env[1381]: time="2024-02-09T18:58:39.414665780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pzdzp,Uid:d73a0299-701b-4363-ac5d-75f6910dcb1c,Namespace:calico-system,Attempt:0,} returns sandbox id \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\"" Feb 9 18:58:39.419516 env[1381]: time="2024-02-09T18:58:39.419477745Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:58:39.492196 env[1381]: time="2024-02-09T18:58:39.492089815Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497\"" Feb 9 18:58:39.493631 env[1381]: time="2024-02-09T18:58:39.493600029Z" level=info msg="StartContainer for \"64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497\"" Feb 9 18:58:39.515276 systemd[1]: Started cri-containerd-64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497.scope. Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3617 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634633665386235346234613330656633343564633535616364313530 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit: BPF prog-id=152 op=LOAD Feb 9 18:58:39.532000 audit[3661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3617 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634633665386235346234613330656633343564633535616364313530 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit: BPF prog-id=153 op=LOAD Feb 9 18:58:39.532000 audit[3661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3617 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634633665386235346234613330656633343564633535616364313530 Feb 9 18:58:39.532000 audit: BPF prog-id=153 op=UNLOAD Feb 9 18:58:39.532000 audit: BPF prog-id=152 op=UNLOAD Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { perfmon } for pid=3661 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit[3661]: AVC avc: denied { bpf } for pid=3661 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:39.532000 audit: BPF prog-id=154 op=LOAD Feb 9 18:58:39.532000 audit[3661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3617 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:39.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634633665386235346234613330656633343564633535616364313530 Feb 9 18:58:39.562378 env[1381]: time="2024-02-09T18:58:39.562275663Z" level=info msg="StartContainer for \"64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497\" returns successfully" Feb 9 18:58:39.573444 systemd[1]: cri-containerd-64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497.scope: Deactivated successfully. Feb 9 18:58:39.576000 audit: BPF prog-id=154 op=UNLOAD Feb 9 18:58:39.634322 env[1381]: time="2024-02-09T18:58:39.634277687Z" level=info msg="shim disconnected" id=64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497 Feb 9 18:58:39.634667 env[1381]: time="2024-02-09T18:58:39.634645891Z" level=warning msg="cleaning up after shim disconnected" id=64c6e8b54b4a30ef345dc55acd150d91640bd0dcd08131d1f147ffacbb42f497 namespace=k8s.io Feb 9 18:58:39.634744 env[1381]: time="2024-02-09T18:58:39.634730892Z" level=info msg="cleaning up dead shim" Feb 9 18:58:39.643830 env[1381]: time="2024-02-09T18:58:39.643776855Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3699 runtime=io.containerd.runc.v2\n" Feb 9 18:58:39.874843 kubelet[2547]: I0209 18:58:39.874760 2547 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=5c3ef883-e8df-40ba-b38c-6221e35c2faf path="/var/lib/kubelet/pods/5c3ef883-e8df-40ba-b38c-6221e35c2faf/volumes" Feb 9 18:58:39.967534 env[1381]: time="2024-02-09T18:58:39.967498883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:58:40.871119 kubelet[2547]: E0209 18:58:40.871090 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:41.311967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3822301051.mount: Deactivated successfully. Feb 9 18:58:42.871261 kubelet[2547]: E0209 18:58:42.871218 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:44.783299 env[1381]: time="2024-02-09T18:58:44.783225476Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:44.792135 env[1381]: time="2024-02-09T18:58:44.792080951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:44.799268 env[1381]: time="2024-02-09T18:58:44.799211252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:44.805320 env[1381]: time="2024-02-09T18:58:44.805262063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:44.805989 env[1381]: time="2024-02-09T18:58:44.805960269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 18:58:44.808482 env[1381]: time="2024-02-09T18:58:44.808448650Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:58:44.845768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1536550093.mount: Deactivated successfully. Feb 9 18:58:44.870690 kubelet[2547]: E0209 18:58:44.870645 2547 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:44.873452 env[1381]: time="2024-02-09T18:58:44.873402962Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b\"" Feb 9 18:58:44.875740 env[1381]: time="2024-02-09T18:58:44.874558892Z" level=info msg="StartContainer for \"fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b\"" Feb 9 18:58:44.899168 systemd[1]: run-containerd-runc-k8s.io-fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b-runc.DEPc2k.mount: Deactivated successfully. Feb 9 18:58:44.900573 systemd[1]: Started cri-containerd-fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b.scope. Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919751 kernel: kauditd_printk_skb: 257 callbacks suppressed Feb 9 18:58:44.919876 kernel: audit: type=1400 audit(1707505124.913:1197): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3617 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:44.965898 kernel: audit: type=1300 audit(1707505124.913:1197): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3617 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:44.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663264646364653562646437366464643833353131323432396134 Feb 9 18:58:44.992693 kernel: audit: type=1327 audit(1707505124.913:1197): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663264646364653562646437366464643833353131323432396134 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.013549 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.033555 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.036167 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.071636 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.090005 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.090059 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:45.109237 env[1381]: time="2024-02-09T18:58:45.109190831Z" level=info msg="StartContainer for \"fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b\" returns successfully" Feb 9 18:58:45.126709 kernel: audit: type=1400 audit(1707505124.913:1198): avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.913000 audit: BPF prog-id=155 op=LOAD Feb 9 18:58:44.913000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3617 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:44.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663264646364653562646437366464643833353131323432396134 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.919000 audit: BPF prog-id=156 op=LOAD Feb 9 18:58:44.919000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3617 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:44.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663264646364653562646437366464643833353131323432396134 Feb 9 18:58:44.937000 audit: BPF prog-id=156 op=UNLOAD Feb 9 18:58:44.937000 audit: BPF prog-id=155 op=UNLOAD Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { perfmon } for pid=3724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit[3724]: AVC avc: denied { bpf } for pid=3724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:44.937000 audit: BPF prog-id=157 op=LOAD Feb 9 18:58:44.937000 audit[3724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3617 pid=3724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:44.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663264646364653562646437366464643833353131323432396134 Feb 9 18:58:46.327115 env[1381]: time="2024-02-09T18:58:46.327060610Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:58:46.330332 systemd[1]: cri-containerd-fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b.scope: Deactivated successfully. Feb 9 18:58:46.333000 audit: BPF prog-id=157 op=UNLOAD Feb 9 18:58:46.338120 kubelet[2547]: I0209 18:58:46.338096 2547 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:58:46.361851 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b-rootfs.mount: Deactivated successfully. Feb 9 18:58:46.379010 kubelet[2547]: I0209 18:58:46.378288 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.381022 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.382473 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.549883 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w94wk\" (UniqueName: \"kubernetes.io/projected/d1709403-da29-4851-968a-907c9a5fb840-kube-api-access-w94wk\") pod \"coredns-787d4945fb-lmjrz\" (UID: \"d1709403-da29-4851-968a-907c9a5fb840\") " pod="kube-system/coredns-787d4945fb-lmjrz" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.549961 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d1709403-da29-4851-968a-907c9a5fb840-config-volume\") pod \"coredns-787d4945fb-lmjrz\" (UID: \"d1709403-da29-4851-968a-907c9a5fb840\") " pod="kube-system/coredns-787d4945fb-lmjrz" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.550003 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3ee7527c-7e35-45be-866e-4a616a725c82-config-volume\") pod \"coredns-787d4945fb-6tvxj\" (UID: \"3ee7527c-7e35-45be-866e-4a616a725c82\") " pod="kube-system/coredns-787d4945fb-6tvxj" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.550065 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rrlz\" (UniqueName: \"kubernetes.io/projected/3ee7527c-7e35-45be-866e-4a616a725c82-kube-api-access-9rrlz\") pod \"coredns-787d4945fb-6tvxj\" (UID: \"3ee7527c-7e35-45be-866e-4a616a725c82\") " pod="kube-system/coredns-787d4945fb-6tvxj" Feb 9 18:58:46.610704 kubelet[2547]: I0209 18:58:46.550099 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vpmnh\" (UniqueName: \"kubernetes.io/projected/22732269-01df-4c3c-b9cc-125299dec8ca-kube-api-access-vpmnh\") pod \"calico-kube-controllers-785cf47668-ljfpm\" (UID: \"22732269-01df-4c3c-b9cc-125299dec8ca\") " pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" Feb 9 18:58:46.384796 systemd[1]: Created slice kubepods-burstable-podd1709403_da29_4851_968a_907c9a5fb840.slice. Feb 9 18:58:46.611049 kubelet[2547]: I0209 18:58:46.550126 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/22732269-01df-4c3c-b9cc-125299dec8ca-tigera-ca-bundle\") pod \"calico-kube-controllers-785cf47668-ljfpm\" (UID: \"22732269-01df-4c3c-b9cc-125299dec8ca\") " pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" Feb 9 18:58:46.391090 systemd[1]: Created slice kubepods-besteffort-pod22732269_01df_4c3c_b9cc_125299dec8ca.slice. Feb 9 18:58:46.398512 systemd[1]: Created slice kubepods-burstable-pod3ee7527c_7e35_45be_866e_4a616a725c82.slice. Feb 9 18:58:46.875135 systemd[1]: Created slice kubepods-besteffort-pod049837c9_e835_4853_993b_156aeaf6d766.slice. Feb 9 18:58:46.878869 env[1381]: time="2024-02-09T18:58:46.878519668Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gbxpr,Uid:049837c9-e835-4853-993b-156aeaf6d766,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:46.915542 env[1381]: time="2024-02-09T18:58:46.915312651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-6tvxj,Uid:3ee7527c-7e35-45be-866e-4a616a725c82,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:46.915542 env[1381]: time="2024-02-09T18:58:46.915312651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-lmjrz,Uid:d1709403-da29-4851-968a-907c9a5fb840,Namespace:kube-system,Attempt:0,}" Feb 9 18:58:46.916014 env[1381]: time="2024-02-09T18:58:46.915980537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cf47668-ljfpm,Uid:22732269-01df-4c3c-b9cc-125299dec8ca,Namespace:calico-system,Attempt:0,}" Feb 9 18:58:47.498081 env[1381]: time="2024-02-09T18:58:47.498019584Z" level=info msg="shim disconnected" id=fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b Feb 9 18:58:47.498081 env[1381]: time="2024-02-09T18:58:47.498075465Z" level=warning msg="cleaning up after shim disconnected" id=fff2ddcde5bdd76ddd835112429a4876bcabae44c9f02e3f786f72199490e87b namespace=k8s.io Feb 9 18:58:47.498081 env[1381]: time="2024-02-09T18:58:47.498084185Z" level=info msg="cleaning up dead shim" Feb 9 18:58:47.506350 env[1381]: time="2024-02-09T18:58:47.506300452Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:58:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3774 runtime=io.containerd.runc.v2\n" Feb 9 18:58:47.709849 env[1381]: time="2024-02-09T18:58:47.709778821Z" level=error msg="Failed to destroy network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.710438 env[1381]: time="2024-02-09T18:58:47.710401786Z" level=error msg="encountered an error cleaning up failed sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.710573 env[1381]: time="2024-02-09T18:58:47.710546267Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gbxpr,Uid:049837c9-e835-4853-993b-156aeaf6d766,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.710906 kubelet[2547]: E0209 18:58:47.710867 2547 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.711182 kubelet[2547]: E0209 18:58:47.710941 2547 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:47.711182 kubelet[2547]: E0209 18:58:47.710964 2547 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gbxpr" Feb 9 18:58:47.711182 kubelet[2547]: E0209 18:58:47.711031 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gbxpr_calico-system(049837c9-e835-4853-993b-156aeaf6d766)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gbxpr_calico-system(049837c9-e835-4853-993b-156aeaf6d766)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:47.744747 env[1381]: time="2024-02-09T18:58:47.744684064Z" level=error msg="Failed to destroy network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.745058 env[1381]: time="2024-02-09T18:58:47.745024786Z" level=error msg="encountered an error cleaning up failed sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.745118 env[1381]: time="2024-02-09T18:58:47.745081667Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-6tvxj,Uid:3ee7527c-7e35-45be-866e-4a616a725c82,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.745363 kubelet[2547]: E0209 18:58:47.745326 2547 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.745450 kubelet[2547]: E0209 18:58:47.745390 2547 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-6tvxj" Feb 9 18:58:47.745450 kubelet[2547]: E0209 18:58:47.745434 2547 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-6tvxj" Feb 9 18:58:47.745512 kubelet[2547]: E0209 18:58:47.745486 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-6tvxj_kube-system(3ee7527c-7e35-45be-866e-4a616a725c82)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-6tvxj_kube-system(3ee7527c-7e35-45be-866e-4a616a725c82)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-6tvxj" podUID=3ee7527c-7e35-45be-866e-4a616a725c82 Feb 9 18:58:47.761047 env[1381]: time="2024-02-09T18:58:47.760151869Z" level=error msg="Failed to destroy network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.761047 env[1381]: time="2024-02-09T18:58:47.760505192Z" level=error msg="encountered an error cleaning up failed sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.761047 env[1381]: time="2024-02-09T18:58:47.760550912Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-lmjrz,Uid:d1709403-da29-4851-968a-907c9a5fb840,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.761422 kubelet[2547]: E0209 18:58:47.761387 2547 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.761497 kubelet[2547]: E0209 18:58:47.761454 2547 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-lmjrz" Feb 9 18:58:47.761497 kubelet[2547]: E0209 18:58:47.761475 2547 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-lmjrz" Feb 9 18:58:47.761549 kubelet[2547]: E0209 18:58:47.761542 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-lmjrz_kube-system(d1709403-da29-4851-968a-907c9a5fb840)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-lmjrz_kube-system(d1709403-da29-4851-968a-907c9a5fb840)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-lmjrz" podUID=d1709403-da29-4851-968a-907c9a5fb840 Feb 9 18:58:47.773015 env[1381]: time="2024-02-09T18:58:47.772957613Z" level=error msg="Failed to destroy network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.773349 env[1381]: time="2024-02-09T18:58:47.773317696Z" level=error msg="encountered an error cleaning up failed sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.773410 env[1381]: time="2024-02-09T18:58:47.773373016Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cf47668-ljfpm,Uid:22732269-01df-4c3c-b9cc-125299dec8ca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.773650 kubelet[2547]: E0209 18:58:47.773620 2547 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:47.773718 kubelet[2547]: E0209 18:58:47.773681 2547 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" Feb 9 18:58:47.773718 kubelet[2547]: E0209 18:58:47.773703 2547 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" Feb 9 18:58:47.775961 kubelet[2547]: E0209 18:58:47.775930 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-785cf47668-ljfpm_calico-system(22732269-01df-4c3c-b9cc-125299dec8ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-785cf47668-ljfpm_calico-system(22732269-01df-4c3c-b9cc-125299dec8ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" podUID=22732269-01df-4c3c-b9cc-125299dec8ca Feb 9 18:58:48.027083 env[1381]: time="2024-02-09T18:58:48.025118614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:58:48.033737 env[1381]: time="2024-02-09T18:58:48.029414928Z" level=info msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" Feb 9 18:58:48.033737 env[1381]: time="2024-02-09T18:58:48.031334304Z" level=info msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" Feb 9 18:58:48.033875 kubelet[2547]: I0209 18:58:48.028415 2547 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:58:48.033875 kubelet[2547]: I0209 18:58:48.030794 2547 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:48.033875 kubelet[2547]: I0209 18:58:48.033261 2547 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:58:48.033958 env[1381]: time="2024-02-09T18:58:48.033740163Z" level=info msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" Feb 9 18:58:48.034945 kubelet[2547]: I0209 18:58:48.034914 2547 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:48.035743 env[1381]: time="2024-02-09T18:58:48.035677818Z" level=info msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" Feb 9 18:58:48.077220 env[1381]: time="2024-02-09T18:58:48.077165430Z" level=error msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" failed" error="failed to destroy network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:48.077652 kubelet[2547]: E0209 18:58:48.077625 2547 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:48.077732 kubelet[2547]: E0209 18:58:48.077682 2547 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4} Feb 9 18:58:48.077732 kubelet[2547]: E0209 18:58:48.077718 2547 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3ee7527c-7e35-45be-866e-4a616a725c82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:58:48.077810 kubelet[2547]: E0209 18:58:48.077756 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3ee7527c-7e35-45be-866e-4a616a725c82\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-6tvxj" podUID=3ee7527c-7e35-45be-866e-4a616a725c82 Feb 9 18:58:48.085797 env[1381]: time="2024-02-09T18:58:48.085737098Z" level=error msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" failed" error="failed to destroy network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:48.086080 kubelet[2547]: E0209 18:58:48.086055 2547 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:58:48.086145 kubelet[2547]: E0209 18:58:48.086106 2547 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb} Feb 9 18:58:48.086176 kubelet[2547]: E0209 18:58:48.086147 2547 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"049837c9-e835-4853-993b-156aeaf6d766\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:58:48.086237 kubelet[2547]: E0209 18:58:48.086182 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"049837c9-e835-4853-993b-156aeaf6d766\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gbxpr" podUID=049837c9-e835-4853-993b-156aeaf6d766 Feb 9 18:58:48.095412 env[1381]: time="2024-02-09T18:58:48.095356135Z" level=error msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" failed" error="failed to destroy network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:48.095843 kubelet[2547]: E0209 18:58:48.095800 2547 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:48.095921 kubelet[2547]: E0209 18:58:48.095856 2547 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42} Feb 9 18:58:48.095921 kubelet[2547]: E0209 18:58:48.095892 2547 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1709403-da29-4851-968a-907c9a5fb840\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:58:48.096031 kubelet[2547]: E0209 18:58:48.095929 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1709403-da29-4851-968a-907c9a5fb840\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-lmjrz" podUID=d1709403-da29-4851-968a-907c9a5fb840 Feb 9 18:58:48.104271 env[1381]: time="2024-02-09T18:58:48.104191605Z" level=error msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" failed" error="failed to destroy network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:58:48.104676 kubelet[2547]: E0209 18:58:48.104641 2547 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:58:48.104750 kubelet[2547]: E0209 18:58:48.104698 2547 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d} Feb 9 18:58:48.104750 kubelet[2547]: E0209 18:58:48.104738 2547 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"22732269-01df-4c3c-b9cc-125299dec8ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:58:48.104833 kubelet[2547]: E0209 18:58:48.104776 2547 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"22732269-01df-4c3c-b9cc-125299dec8ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" podUID=22732269-01df-4c3c-b9cc-125299dec8ca Feb 9 18:58:48.592125 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4-shm.mount: Deactivated successfully. Feb 9 18:58:48.592210 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42-shm.mount: Deactivated successfully. Feb 9 18:58:48.592276 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb-shm.mount: Deactivated successfully. Feb 9 18:58:51.294133 kubelet[2547]: I0209 18:58:51.294039 2547 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 18:58:51.351000 audit[4025]: NETFILTER_CFG table=filter:119 family=2 entries=13 op=nft_register_rule pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:51.358694 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:58:51.358777 kernel: audit: type=1325 audit(1707505131.351:1204): table=filter:119 family=2 entries=13 op=nft_register_rule pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:51.351000 audit[4025]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffc782b660 a2=0 a3=ffffb43d16c0 items=0 ppid=2745 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:51.402086 kernel: audit: type=1300 audit(1707505131.351:1204): arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffc782b660 a2=0 a3=ffffb43d16c0 items=0 ppid=2745 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:51.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:51.416520 kernel: audit: type=1327 audit(1707505131.351:1204): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:51.352000 audit[4025]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:51.431571 kernel: audit: type=1325 audit(1707505131.352:1205): table=nat:120 family=2 entries=27 op=nft_register_chain pid=4025 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:58:51.352000 audit[4025]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc782b660 a2=0 a3=ffffb43d16c0 items=0 ppid=2745 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:51.460098 kernel: audit: type=1300 audit(1707505131.352:1205): arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc782b660 a2=0 a3=ffffb43d16c0 items=0 ppid=2745 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:51.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:51.475782 kernel: audit: type=1327 audit(1707505131.352:1205): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:58:54.529187 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1995946159.mount: Deactivated successfully. Feb 9 18:58:54.908367 env[1381]: time="2024-02-09T18:58:54.908223754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:54.917097 env[1381]: time="2024-02-09T18:58:54.917049219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:54.925116 env[1381]: time="2024-02-09T18:58:54.925074518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:54.930101 env[1381]: time="2024-02-09T18:58:54.930064154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:58:54.931131 env[1381]: time="2024-02-09T18:58:54.930643518Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 18:58:54.946901 env[1381]: time="2024-02-09T18:58:54.946852437Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:58:54.986545 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1009736532.mount: Deactivated successfully. Feb 9 18:58:55.007088 env[1381]: time="2024-02-09T18:58:55.007043158Z" level=info msg="CreateContainer within sandbox \"70adc85d170835213d3e45a1efc51926a799e45465e385b108c2a71f861e48f6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e\"" Feb 9 18:58:55.008192 env[1381]: time="2024-02-09T18:58:55.008166766Z" level=info msg="StartContainer for \"be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e\"" Feb 9 18:58:55.023386 systemd[1]: Started cri-containerd-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e.scope. Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3617 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:55.091265 kernel: audit: type=1400 audit(1707505135.042:1206): avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.091412 kernel: audit: type=1300 audit(1707505135.042:1206): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3617 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373532653035643962356536363963353630343638376533303438 Feb 9 18:58:55.125595 kernel: audit: type=1327 audit(1707505135.042:1206): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373532653035643962356536363963353630343638376533303438 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.144379 kernel: audit: type=1400 audit(1707505135.042:1207): avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit: BPF prog-id=158 op=LOAD Feb 9 18:58:55.042000 audit[4037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3617 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373532653035643962356536363963353630343638376533303438 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit: BPF prog-id=159 op=LOAD Feb 9 18:58:55.042000 audit[4037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3617 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373532653035643962356536363963353630343638376533303438 Feb 9 18:58:55.042000 audit: BPF prog-id=159 op=UNLOAD Feb 9 18:58:55.042000 audit: BPF prog-id=158 op=UNLOAD Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { perfmon } for pid=4037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit[4037]: AVC avc: denied { bpf } for pid=4037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:55.042000 audit: BPF prog-id=160 op=LOAD Feb 9 18:58:55.042000 audit[4037]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3617 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:55.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373532653035643962356536363963353630343638376533303438 Feb 9 18:58:55.154506 env[1381]: time="2024-02-09T18:58:55.154442384Z" level=info msg="StartContainer for \"be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e\" returns successfully" Feb 9 18:58:55.402205 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:58:55.402378 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:58:56.115061 kubelet[2547]: I0209 18:58:56.114659 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pzdzp" podStartSLOduration=-9.223372018740189e+09 pod.CreationTimestamp="2024-02-09 18:58:38 +0000 UTC" firstStartedPulling="2024-02-09 18:58:39.967120039 +0000 UTC m=+28.314649894" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:58:56.114187674 +0000 UTC m=+44.461717529" watchObservedRunningTime="2024-02-09 18:58:56.114586917 +0000 UTC m=+44.462116772" Feb 9 18:58:56.126413 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.ws4Ate.mount: Deactivated successfully. Feb 9 18:58:56.724000 audit[4164]: AVC avc: denied { write } for pid=4164 comm="tee" name="fd" dev="proc" ino=26470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.730375 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 9 18:58:56.730498 kernel: audit: type=1400 audit(1707505136.724:1212): avc: denied { write } for pid=4164 comm="tee" name="fd" dev="proc" ino=26470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.750000 audit[4178]: AVC avc: denied { write } for pid=4178 comm="tee" name="fd" dev="proc" ino=26773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.772442 kernel: audit: type=1400 audit(1707505136.750:1213): avc: denied { write } for pid=4178 comm="tee" name="fd" dev="proc" ino=26773 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.772635 kernel: audit: type=1300 audit(1707505136.750:1213): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0389979 a2=241 a3=1b6 items=1 ppid=4134 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.750000 audit[4178]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe0389979 a2=241 a3=1b6 items=1 ppid=4134 pid=4178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.750000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:58:56.808745 kernel: audit: type=1307 audit(1707505136.750:1213): cwd="/etc/service/enabled/felix/log" Feb 9 18:58:56.750000 audit: PATH item=0 name="/dev/fd/63" inode=26764 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.827225 kernel: audit: type=1302 audit(1707505136.750:1213): item=0 name="/dev/fd/63" inode=26764 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.846080 kernel: audit: type=1327 audit(1707505136.750:1213): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.724000 audit[4164]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1f5c979 a2=241 a3=1b6 items=1 ppid=4136 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.873454 kernel: audit: type=1300 audit(1707505136.724:1212): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1f5c979 a2=241 a3=1b6 items=1 ppid=4136 pid=4164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.724000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:58:56.882003 kernel: audit: type=1307 audit(1707505136.724:1212): cwd="/etc/service/enabled/bird6/log" Feb 9 18:58:56.724000 audit: PATH item=0 name="/dev/fd/63" inode=26744 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.899971 kernel: audit: type=1302 audit(1707505136.724:1212): item=0 name="/dev/fd/63" inode=26744 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.917131 kernel: audit: type=1327 audit(1707505136.724:1212): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.783000 audit[4181]: AVC avc: denied { write } for pid=4181 comm="tee" name="fd" dev="proc" ino=26783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.783000 audit[4181]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7fb596a a2=241 a3=1b6 items=1 ppid=4127 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.783000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:58:56.783000 audit: PATH item=0 name="/dev/fd/63" inode=26471 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.783000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.795000 audit[4184]: AVC avc: denied { write } for pid=4184 comm="tee" name="fd" dev="proc" ino=26792 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.795000 audit[4184]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff80d797a a2=241 a3=1b6 items=1 ppid=4148 pid=4184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.795000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:58:56.795000 audit: PATH item=0 name="/dev/fd/63" inode=26778 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.795000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.799000 audit[4187]: AVC avc: denied { write } for pid=4187 comm="tee" name="fd" dev="proc" ino=26796 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.799000 audit[4187]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6252979 a2=241 a3=1b6 items=1 ppid=4141 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.799000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:58:56.799000 audit: PATH item=0 name="/dev/fd/63" inode=26787 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.799000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.880000 audit[4190]: AVC avc: denied { write } for pid=4190 comm="tee" name="fd" dev="proc" ino=26803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.880000 audit[4190]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefb6197b a2=241 a3=1b6 items=1 ppid=4128 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.880000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:58:56.880000 audit: PATH item=0 name="/dev/fd/63" inode=26798 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.880000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:56.917000 audit[4195]: AVC avc: denied { write } for pid=4195 comm="tee" name="fd" dev="proc" ino=26477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:58:56.917000 audit[4195]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc0c4969 a2=241 a3=1b6 items=1 ppid=4131 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:56.917000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:58:56.917000 audit: PATH item=0 name="/dev/fd/63" inode=26805 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:58:56.917000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.568000 audit: BPF prog-id=161 op=LOAD Feb 9 18:58:57.568000 audit[4289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2495e98 a2=70 a3=0 items=0 ppid=4135 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.568000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:58:57.569000 audit: BPF prog-id=161 op=UNLOAD Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit: BPF prog-id=162 op=LOAD Feb 9 18:58:57.569000 audit[4289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2495e98 a2=70 a3=4a174c items=0 ppid=4135 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:58:57.569000 audit: BPF prog-id=162 op=UNLOAD Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe2495ec8 a2=70 a3=30f9479f items=0 ppid=4135 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { perfmon } for pid=4289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit[4289]: AVC avc: denied { bpf } for pid=4289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.569000 audit: BPF prog-id=163 op=LOAD Feb 9 18:58:57.569000 audit[4289]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe2495e18 a2=70 a3=30f947b9 items=0 ppid=4135 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.569000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:58:57.574000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.574000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe3f5cd08 a2=70 a3=0 items=0 ppid=4135 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.574000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:58:57.574000 audit[4293]: AVC avc: denied { bpf } for pid=4293 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:57.574000 audit[4293]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe3f5cbe8 a2=70 a3=2 items=0 ppid=4135 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.574000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:58:57.585000 audit: BPF prog-id=163 op=UNLOAD Feb 9 18:58:57.814000 audit[4319]: NETFILTER_CFG table=mangle:121 family=2 entries=19 op=nft_register_chain pid=4319 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:57.814000 audit[4319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe3ecf150 a2=0 a3=ffffb0c9cfa8 items=0 ppid=4135 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.814000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:57.821000 audit[4320]: NETFILTER_CFG table=nat:122 family=2 entries=16 op=nft_register_chain pid=4320 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:57.821000 audit[4320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffff34db920 a2=0 a3=ffffbae09fa8 items=0 ppid=4135 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.821000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:57.827000 audit[4325]: NETFILTER_CFG table=filter:123 family=2 entries=39 op=nft_register_chain pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:57.827000 audit[4325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffcd35faf0 a2=0 a3=ffffad751fa8 items=0 ppid=4135 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.827000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:57.905000 audit[4318]: NETFILTER_CFG table=raw:124 family=2 entries=19 op=nft_register_chain pid=4318 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:57.905000 audit[4318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff5ce5410 a2=0 a3=ffff98d90fa8 items=0 ppid=4135 pid=4318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:57.905000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:58.216649 systemd-networkd[1532]: vxlan.calico: Link UP Feb 9 18:58:58.216656 systemd-networkd[1532]: vxlan.calico: Gained carrier Feb 9 18:58:58.872134 env[1381]: time="2024-02-09T18:58:58.872048070Z" level=info msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" Feb 9 18:58:58.873542 env[1381]: time="2024-02-09T18:58:58.872615474Z" level=info msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.949 [INFO][4357] k8s.go 578: Cleaning up netns ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.949 [INFO][4357] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" iface="eth0" netns="/var/run/netns/cni-a22495df-84c6-dc80-6850-9aeee3f37b39" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.950 [INFO][4357] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" iface="eth0" netns="/var/run/netns/cni-a22495df-84c6-dc80-6850-9aeee3f37b39" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.950 [INFO][4357] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" iface="eth0" netns="/var/run/netns/cni-a22495df-84c6-dc80-6850-9aeee3f37b39" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.950 [INFO][4357] k8s.go 585: Releasing IP address(es) ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.950 [INFO][4357] utils.go 188: Calico CNI releasing IP address ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.981 [INFO][4368] ipam_plugin.go 415: Releasing address using handleID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.982 [INFO][4368] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.982 [INFO][4368] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.995 [WARNING][4368] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.996 [INFO][4368] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:58.997 [INFO][4368] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:58:59.004510 env[1381]: 2024-02-09 18:58:59.001 [INFO][4357] k8s.go 591: Teardown processing complete. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:58:59.007648 env[1381]: time="2024-02-09T18:58:59.004655712Z" level=info msg="TearDown network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" successfully" Feb 9 18:58:59.007648 env[1381]: time="2024-02-09T18:58:59.004687033Z" level=info msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" returns successfully" Feb 9 18:58:59.007648 env[1381]: time="2024-02-09T18:58:59.006207003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-6tvxj,Uid:3ee7527c-7e35-45be-866e-4a616a725c82,Namespace:kube-system,Attempt:1,}" Feb 9 18:58:59.008207 systemd[1]: run-netns-cni\x2da22495df\x2d84c6\x2ddc80\x2d6850\x2d9aeee3f37b39.mount: Deactivated successfully. Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.955 [INFO][4356] k8s.go 578: Cleaning up netns ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.956 [INFO][4356] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" iface="eth0" netns="/var/run/netns/cni-2eae3834-51d1-49d2-ab07-19e456601365" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.956 [INFO][4356] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" iface="eth0" netns="/var/run/netns/cni-2eae3834-51d1-49d2-ab07-19e456601365" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.956 [INFO][4356] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" iface="eth0" netns="/var/run/netns/cni-2eae3834-51d1-49d2-ab07-19e456601365" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.956 [INFO][4356] k8s.go 585: Releasing IP address(es) ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.956 [INFO][4356] utils.go 188: Calico CNI releasing IP address ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.996 [INFO][4372] ipam_plugin.go 415: Releasing address using handleID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.996 [INFO][4372] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:58.997 [INFO][4372] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:59.012 [WARNING][4372] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:59.012 [INFO][4372] ipam_plugin.go 443: Releasing address using workloadID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:59.013 [INFO][4372] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:58:59.016802 env[1381]: 2024-02-09 18:58:59.015 [INFO][4356] k8s.go 591: Teardown processing complete. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:58:59.017418 env[1381]: time="2024-02-09T18:58:59.017386200Z" level=info msg="TearDown network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" successfully" Feb 9 18:58:59.017512 env[1381]: time="2024-02-09T18:58:59.017496281Z" level=info msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" returns successfully" Feb 9 18:58:59.020957 systemd[1]: run-netns-cni\x2d2eae3834\x2d51d1\x2d49d2\x2dab07\x2d19e456601365.mount: Deactivated successfully. Feb 9 18:58:59.021639 env[1381]: time="2024-02-09T18:58:59.021601789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-lmjrz,Uid:d1709403-da29-4851-968a-907c9a5fb840,Namespace:kube-system,Attempt:1,}" Feb 9 18:58:59.228365 systemd-networkd[1532]: cali2e21c6b06d4: Link UP Feb 9 18:58:59.244179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:58:59.244311 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e21c6b06d4: link becomes ready Feb 9 18:58:59.246411 systemd-networkd[1532]: cali2e21c6b06d4: Gained carrier Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.146 [INFO][4380] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0 coredns-787d4945fb- kube-system 3ee7527c-7e35-45be-866e-4a616a725c82 754 0 2024-02-09 18:58:25 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 coredns-787d4945fb-6tvxj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2e21c6b06d4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.146 [INFO][4380] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.184 [INFO][4405] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" HandleID="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.198 [INFO][4405] ipam_plugin.go 268: Auto assigning IP ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" HandleID="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c070), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-71d57399a1", "pod":"coredns-787d4945fb-6tvxj", "timestamp":"2024-02-09 18:58:59.184672429 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.198 [INFO][4405] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.198 [INFO][4405] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.198 [INFO][4405] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.200 [INFO][4405] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.204 [INFO][4405] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.208 [INFO][4405] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.209 [INFO][4405] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.211 [INFO][4405] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.211 [INFO][4405] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.213 [INFO][4405] ipam.go 1682: Creating new handle: k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.216 [INFO][4405] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.222 [INFO][4405] ipam.go 1216: Successfully claimed IPs: [192.168.120.129/26] block=192.168.120.128/26 handle="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.222 [INFO][4405] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.129/26] handle="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.222 [INFO][4405] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:58:59.268984 env[1381]: 2024-02-09 18:58:59.222 [INFO][4405] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.129/26] IPv6=[] ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" HandleID="k8s-pod-network.28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.224 [INFO][4380] k8s.go 385: Populated endpoint ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3ee7527c-7e35-45be-866e-4a616a725c82", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"coredns-787d4945fb-6tvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e21c6b06d4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.224 [INFO][4380] k8s.go 386: Calico CNI using IPs: [192.168.120.129/32] ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.224 [INFO][4380] dataplane_linux.go 68: Setting the host side veth name to cali2e21c6b06d4 ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.249 [INFO][4380] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.252 [INFO][4380] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3ee7527c-7e35-45be-866e-4a616a725c82", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a", Pod:"coredns-787d4945fb-6tvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e21c6b06d4", MAC:"1a:d4:0f:b7:82:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:58:59.269631 env[1381]: 2024-02-09 18:58:59.267 [INFO][4380] k8s.go 491: Wrote updated endpoint to datastore ContainerID="28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a" Namespace="kube-system" Pod="coredns-787d4945fb-6tvxj" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:58:59.299355 env[1381]: time="2024-02-09T18:58:59.299016255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:59.299355 env[1381]: time="2024-02-09T18:58:59.299058375Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:59.299355 env[1381]: time="2024-02-09T18:58:59.299070736Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:59.299355 env[1381]: time="2024-02-09T18:58:59.299183376Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a pid=4439 runtime=io.containerd.runc.v2 Feb 9 18:58:59.308000 audit[4455]: NETFILTER_CFG table=filter:125 family=2 entries=36 op=nft_register_chain pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:59.308000 audit[4455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffcb0085c0 a2=0 a3=ffffb823ffa8 items=0 ppid=4135 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.308000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:59.313845 systemd[1]: Started cri-containerd-28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a.scope. Feb 9 18:58:59.337180 systemd-networkd[1532]: califaefcd86bfc: Link UP Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit: BPF prog-id=164 op=LOAD Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4439 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383639633737346337386539313665373065623862303466376131 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4439 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383639633737346337386539313665373065623862303466376131 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit: BPF prog-id=165 op=LOAD Feb 9 18:58:59.345000 audit[4449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4439 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383639633737346337386539313665373065623862303466376131 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.345000 audit: BPF prog-id=166 op=LOAD Feb 9 18:58:59.345000 audit[4449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4439 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383639633737346337386539313665373065623862303466376131 Feb 9 18:58:59.346000 audit: BPF prog-id=166 op=UNLOAD Feb 9 18:58:59.346000 audit: BPF prog-id=165 op=UNLOAD Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { perfmon } for pid=4449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit[4449]: AVC avc: denied { bpf } for pid=4449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.346000 audit: BPF prog-id=167 op=LOAD Feb 9 18:58:59.346000 audit[4449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4439 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238383639633737346337386539313665373065623862303466376131 Feb 9 18:58:59.350934 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califaefcd86bfc: link becomes ready Feb 9 18:58:59.350383 systemd-networkd[1532]: califaefcd86bfc: Gained carrier Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.161 [INFO][4391] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0 coredns-787d4945fb- kube-system d1709403-da29-4851-968a-907c9a5fb840 755 0 2024-02-09 18:58:25 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 coredns-787d4945fb-lmjrz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califaefcd86bfc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.161 [INFO][4391] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.222 [INFO][4411] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" HandleID="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.250 [INFO][4411] ipam_plugin.go 268: Auto assigning IP ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" HandleID="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b27b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-71d57399a1", "pod":"coredns-787d4945fb-lmjrz", "timestamp":"2024-02-09 18:58:59.222334448 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.250 [INFO][4411] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.250 [INFO][4411] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.250 [INFO][4411] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.252 [INFO][4411] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.270 [INFO][4411] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.276 [INFO][4411] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.281 [INFO][4411] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.285 [INFO][4411] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.285 [INFO][4411] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.290 [INFO][4411] ipam.go 1682: Creating new handle: k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540 Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.297 [INFO][4411] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.318 [INFO][4411] ipam.go 1216: Successfully claimed IPs: [192.168.120.130/26] block=192.168.120.128/26 handle="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.318 [INFO][4411] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.130/26] handle="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.319 [INFO][4411] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:58:59.371392 env[1381]: 2024-02-09 18:58:59.319 [INFO][4411] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.130/26] IPv6=[] ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" HandleID="k8s-pod-network.431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.321 [INFO][4391] k8s.go 385: Populated endpoint ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d1709403-da29-4851-968a-907c9a5fb840", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"coredns-787d4945fb-lmjrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califaefcd86bfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.322 [INFO][4391] k8s.go 386: Calico CNI using IPs: [192.168.120.130/32] ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.322 [INFO][4391] dataplane_linux.go 68: Setting the host side veth name to califaefcd86bfc ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.350 [INFO][4391] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.351 [INFO][4391] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d1709403-da29-4851-968a-907c9a5fb840", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540", Pod:"coredns-787d4945fb-lmjrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califaefcd86bfc", MAC:"be:b2:63:54:e1:0f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:58:59.371964 env[1381]: 2024-02-09 18:58:59.364 [INFO][4391] k8s.go 491: Wrote updated endpoint to datastore ContainerID="431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540" Namespace="kube-system" Pod="coredns-787d4945fb-lmjrz" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:58:59.373735 env[1381]: time="2024-02-09T18:58:59.373680688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-6tvxj,Uid:3ee7527c-7e35-45be-866e-4a616a725c82,Namespace:kube-system,Attempt:1,} returns sandbox id \"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a\"" Feb 9 18:58:59.379502 env[1381]: time="2024-02-09T18:58:59.379454808Z" level=info msg="CreateContainer within sandbox \"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:58:59.394000 audit[4485]: NETFILTER_CFG table=filter:126 family=2 entries=30 op=nft_register_chain pid=4485 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:58:59.394000 audit[4485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=16712 a0=3 a1=ffffd517b720 a2=0 a3=ffff9f432fa8 items=0 ppid=4135 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.394000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:58:59.418396 env[1381]: time="2024-02-09T18:58:59.416596383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:58:59.418396 env[1381]: time="2024-02-09T18:58:59.416653624Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:58:59.418396 env[1381]: time="2024-02-09T18:58:59.416664384Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:58:59.418396 env[1381]: time="2024-02-09T18:58:59.416867425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540 pid=4493 runtime=io.containerd.runc.v2 Feb 9 18:58:59.430157 systemd[1]: Started cri-containerd-431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540.scope. Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.448000 audit: BPF prog-id=168 op=LOAD Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4493 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433316535653236383363633437303131653031626166333233633234 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4493 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433316535653236383363633437303131653031626166333233633234 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit: BPF prog-id=169 op=LOAD Feb 9 18:58:59.449000 audit[4505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4493 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433316535653236383363633437303131653031626166333233633234 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit: BPF prog-id=170 op=LOAD Feb 9 18:58:59.449000 audit[4505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4493 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433316535653236383363633437303131653031626166333233633234 Feb 9 18:58:59.449000 audit: BPF prog-id=170 op=UNLOAD Feb 9 18:58:59.449000 audit: BPF prog-id=169 op=UNLOAD Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { perfmon } for pid=4505 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit[4505]: AVC avc: denied { bpf } for pid=4505 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.449000 audit: BPF prog-id=171 op=LOAD Feb 9 18:58:59.449000 audit[4505]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4493 pid=4505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433316535653236383363633437303131653031626166333233633234 Feb 9 18:58:59.469034 env[1381]: time="2024-02-09T18:58:59.468985663Z" level=info msg="CreateContainer within sandbox \"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"94cabddf89a556ea0be1dbc6687941c5209352bbe3707b646ba6fa77f33aa5ae\"" Feb 9 18:58:59.472740 env[1381]: time="2024-02-09T18:58:59.472332406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-lmjrz,Uid:d1709403-da29-4851-968a-907c9a5fb840,Namespace:kube-system,Attempt:1,} returns sandbox id \"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540\"" Feb 9 18:58:59.473132 env[1381]: time="2024-02-09T18:58:59.473105652Z" level=info msg="StartContainer for \"94cabddf89a556ea0be1dbc6687941c5209352bbe3707b646ba6fa77f33aa5ae\"" Feb 9 18:58:59.476446 env[1381]: time="2024-02-09T18:58:59.476408434Z" level=info msg="CreateContainer within sandbox \"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 18:58:59.493054 systemd[1]: Started cri-containerd-94cabddf89a556ea0be1dbc6687941c5209352bbe3707b646ba6fa77f33aa5ae.scope. Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.512000 audit: BPF prog-id=172 op=LOAD Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4439 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636162646466383961353536656130626531646263363638373934 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4439 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636162646466383961353536656130626531646263363638373934 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit: BPF prog-id=173 op=LOAD Feb 9 18:58:59.513000 audit[4537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4439 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636162646466383961353536656130626531646263363638373934 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit: BPF prog-id=174 op=LOAD Feb 9 18:58:59.513000 audit[4537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4439 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636162646466383961353536656130626531646263363638373934 Feb 9 18:58:59.513000 audit: BPF prog-id=174 op=UNLOAD Feb 9 18:58:59.513000 audit: BPF prog-id=173 op=UNLOAD Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { perfmon } for pid=4537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit[4537]: AVC avc: denied { bpf } for pid=4537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.513000 audit: BPF prog-id=175 op=LOAD Feb 9 18:58:59.513000 audit[4537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4439 pid=4537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636162646466383961353536656130626531646263363638373934 Feb 9 18:58:59.535612 env[1381]: time="2024-02-09T18:58:59.535531920Z" level=info msg="StartContainer for \"94cabddf89a556ea0be1dbc6687941c5209352bbe3707b646ba6fa77f33aa5ae\" returns successfully" Feb 9 18:58:59.558699 env[1381]: time="2024-02-09T18:58:59.558637999Z" level=info msg="CreateContainer within sandbox \"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a5b768313893027e9790aecee84f9e8f8b8f3a7657ceae51993bf0b1eecb0a5\"" Feb 9 18:58:59.559643 env[1381]: time="2024-02-09T18:58:59.559604766Z" level=info msg="StartContainer for \"8a5b768313893027e9790aecee84f9e8f8b8f3a7657ceae51993bf0b1eecb0a5\"" Feb 9 18:58:59.578660 systemd[1]: Started cri-containerd-8a5b768313893027e9790aecee84f9e8f8b8f3a7657ceae51993bf0b1eecb0a5.scope. Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit: BPF prog-id=176 op=LOAD Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4493 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861356237363833313338393330323765393739306165636565383466 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4493 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861356237363833313338393330323765393739306165636565383466 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit: BPF prog-id=177 op=LOAD Feb 9 18:58:59.592000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4493 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861356237363833313338393330323765393739306165636565383466 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit: BPF prog-id=178 op=LOAD Feb 9 18:58:59.592000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4493 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861356237363833313338393330323765393739306165636565383466 Feb 9 18:58:59.592000 audit: BPF prog-id=178 op=UNLOAD Feb 9 18:58:59.592000 audit: BPF prog-id=177 op=UNLOAD Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:58:59.592000 audit: BPF prog-id=179 op=LOAD Feb 9 18:58:59.592000 audit[4575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4493 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:58:59.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861356237363833313338393330323765393739306165636565383466 Feb 9 18:58:59.620640 env[1381]: time="2024-02-09T18:58:59.620583065Z" level=info msg="StartContainer for \"8a5b768313893027e9790aecee84f9e8f8b8f3a7657ceae51993bf0b1eecb0a5\" returns successfully" Feb 9 18:58:59.900472 systemd-networkd[1532]: vxlan.calico: Gained IPv6LL Feb 9 18:59:00.132497 kubelet[2547]: I0209 18:59:00.132441 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-lmjrz" podStartSLOduration=35.132401091 pod.CreationTimestamp="2024-02-09 18:58:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:00.119644965 +0000 UTC m=+48.467174820" watchObservedRunningTime="2024-02-09 18:59:00.132401091 +0000 UTC m=+48.479930906" Feb 9 18:59:00.165000 audit[4629]: NETFILTER_CFG table=filter:127 family=2 entries=12 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:00.165000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffc2a03430 a2=0 a3=ffff83cf36c0 items=0 ppid=2745 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:00.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:00.167000 audit[4629]: NETFILTER_CFG table=nat:128 family=2 entries=30 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:00.167000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffc2a03430 a2=0 a3=ffff83cf36c0 items=0 ppid=2745 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:00.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:00.223457 kubelet[2547]: I0209 18:59:00.223415 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-6tvxj" podStartSLOduration=35.223377589 pod.CreationTimestamp="2024-02-09 18:58:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:00.211525028 +0000 UTC m=+48.559054843" watchObservedRunningTime="2024-02-09 18:59:00.223377589 +0000 UTC m=+48.570907444" Feb 9 18:59:00.248000 audit[4655]: NETFILTER_CFG table=filter:129 family=2 entries=9 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:00.248000 audit[4655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff5e21730 a2=0 a3=ffff993b96c0 items=0 ppid=2745 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:00.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:00.249000 audit[4655]: NETFILTER_CFG table=nat:130 family=2 entries=51 op=nft_register_chain pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:00.249000 audit[4655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=fffff5e21730 a2=0 a3=ffff993b96c0 items=0 ppid=2745 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:00.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:00.540455 systemd-networkd[1532]: cali2e21c6b06d4: Gained IPv6LL Feb 9 18:59:00.871691 env[1381]: time="2024-02-09T18:59:00.871503309Z" level=info msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.926 [INFO][4671] k8s.go 578: Cleaning up netns ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.926 [INFO][4671] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" iface="eth0" netns="/var/run/netns/cni-7495cac2-2e11-c110-bcb1-ca6973b87ae0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.926 [INFO][4671] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" iface="eth0" netns="/var/run/netns/cni-7495cac2-2e11-c110-bcb1-ca6973b87ae0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.927 [INFO][4671] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" iface="eth0" netns="/var/run/netns/cni-7495cac2-2e11-c110-bcb1-ca6973b87ae0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.927 [INFO][4671] k8s.go 585: Releasing IP address(es) ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.927 [INFO][4671] utils.go 188: Calico CNI releasing IP address ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.947 [INFO][4677] ipam_plugin.go 415: Releasing address using handleID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.947 [INFO][4677] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.947 [INFO][4677] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.956 [WARNING][4677] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.956 [INFO][4677] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.958 [INFO][4677] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:00.960578 env[1381]: 2024-02-09 18:59:00.959 [INFO][4671] k8s.go 591: Teardown processing complete. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:00.962672 systemd[1]: run-netns-cni\x2d7495cac2\x2d2e11\x2dc110\x2dbcb1\x2dca6973b87ae0.mount: Deactivated successfully. Feb 9 18:59:00.964681 env[1381]: time="2024-02-09T18:59:00.964630941Z" level=info msg="TearDown network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" successfully" Feb 9 18:59:00.964773 env[1381]: time="2024-02-09T18:59:00.964757342Z" level=info msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" returns successfully" Feb 9 18:59:00.965591 env[1381]: time="2024-02-09T18:59:00.965561147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cf47668-ljfpm,Uid:22732269-01df-4c3c-b9cc-125299dec8ca,Namespace:calico-system,Attempt:1,}" Feb 9 18:59:01.116497 systemd-networkd[1532]: califaefcd86bfc: Gained IPv6LL Feb 9 18:59:01.159952 systemd-networkd[1532]: calibeaab50c944: Link UP Feb 9 18:59:01.174975 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:59:01.175096 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibeaab50c944: link becomes ready Feb 9 18:59:01.177485 systemd-networkd[1532]: calibeaab50c944: Gained carrier Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.090 [INFO][4684] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0 calico-kube-controllers-785cf47668- calico-system 22732269-01df-4c3c-b9cc-125299dec8ca 790 0 2024-02-09 18:58:34 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:785cf47668 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 calico-kube-controllers-785cf47668-ljfpm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calibeaab50c944 [] []}} ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.091 [INFO][4684] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.120 [INFO][4694] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" HandleID="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.134 [INFO][4694] ipam_plugin.go 268: Auto assigning IP ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" HandleID="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d950), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-71d57399a1", "pod":"calico-kube-controllers-785cf47668-ljfpm", "timestamp":"2024-02-09 18:59:01.120223228 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.134 [INFO][4694] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.134 [INFO][4694] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.134 [INFO][4694] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.136 [INFO][4694] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.139 [INFO][4694] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.143 [INFO][4694] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.144 [INFO][4694] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.146 [INFO][4694] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.146 [INFO][4694] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.147 [INFO][4694] ipam.go 1682: Creating new handle: k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803 Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.150 [INFO][4694] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.155 [INFO][4694] ipam.go 1216: Successfully claimed IPs: [192.168.120.131/26] block=192.168.120.128/26 handle="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.155 [INFO][4694] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.131/26] handle="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.155 [INFO][4694] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:01.190110 env[1381]: 2024-02-09 18:59:01.155 [INFO][4694] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.131/26] IPv6=[] ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" HandleID="k8s-pod-network.658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.157 [INFO][4684] k8s.go 385: Populated endpoint ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0", GenerateName:"calico-kube-controllers-785cf47668-", Namespace:"calico-system", SelfLink:"", UID:"22732269-01df-4c3c-b9cc-125299dec8ca", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cf47668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"calico-kube-controllers-785cf47668-ljfpm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibeaab50c944", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.157 [INFO][4684] k8s.go 386: Calico CNI using IPs: [192.168.120.131/32] ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.157 [INFO][4684] dataplane_linux.go 68: Setting the host side veth name to calibeaab50c944 ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.177 [INFO][4684] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.177 [INFO][4684] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0", GenerateName:"calico-kube-controllers-785cf47668-", Namespace:"calico-system", SelfLink:"", UID:"22732269-01df-4c3c-b9cc-125299dec8ca", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cf47668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803", Pod:"calico-kube-controllers-785cf47668-ljfpm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibeaab50c944", MAC:"c6:2b:87:1b:7e:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:01.190765 env[1381]: 2024-02-09 18:59:01.188 [INFO][4684] k8s.go 491: Wrote updated endpoint to datastore ContainerID="658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803" Namespace="calico-system" Pod="calico-kube-controllers-785cf47668-ljfpm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:01.209920 env[1381]: time="2024-02-09T18:59:01.209814349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:59:01.210114 env[1381]: time="2024-02-09T18:59:01.209876549Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:59:01.210114 env[1381]: time="2024-02-09T18:59:01.209888189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:59:01.210341 env[1381]: time="2024-02-09T18:59:01.210294472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803 pid=4724 runtime=io.containerd.runc.v2 Feb 9 18:59:01.216000 audit[4734]: NETFILTER_CFG table=filter:131 family=2 entries=44 op=nft_register_chain pid=4734 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:59:01.216000 audit[4734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffcc91af50 a2=0 a3=ffff96f97fa8 items=0 ppid=4135 pid=4734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.216000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:59:01.228088 systemd[1]: Started cri-containerd-658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803.scope. Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.250000 audit: BPF prog-id=180 op=LOAD Feb 9 18:59:01.251000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.251000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4724 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635386239656630346231636133323236313466386436636232363163 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4724 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635386239656630346231636133323236313466386436636232363163 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit: BPF prog-id=181 op=LOAD Feb 9 18:59:01.252000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4724 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635386239656630346231636133323236313466386436636232363163 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit: BPF prog-id=182 op=LOAD Feb 9 18:59:01.252000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4724 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635386239656630346231636133323236313466386436636232363163 Feb 9 18:59:01.252000 audit: BPF prog-id=182 op=UNLOAD Feb 9 18:59:01.252000 audit: BPF prog-id=181 op=UNLOAD Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { perfmon } for pid=4735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit[4735]: AVC avc: denied { bpf } for pid=4735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:01.252000 audit: BPF prog-id=183 op=LOAD Feb 9 18:59:01.252000 audit[4735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4724 pid=4735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635386239656630346231636133323236313466386436636232363163 Feb 9 18:59:01.288059 env[1381]: time="2024-02-09T18:59:01.288006833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-785cf47668-ljfpm,Uid:22732269-01df-4c3c-b9cc-125299dec8ca,Namespace:calico-system,Attempt:1,} returns sandbox id \"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803\"" Feb 9 18:59:01.289926 env[1381]: time="2024-02-09T18:59:01.289888046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 18:59:01.316000 audit[4783]: NETFILTER_CFG table=filter:132 family=2 entries=6 op=nft_register_rule pid=4783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:01.316000 audit[4783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc866a9b0 a2=0 a3=ffffa3bde6c0 items=0 ppid=2745 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:01.343000 audit[4783]: NETFILTER_CFG table=nat:133 family=2 entries=72 op=nft_register_chain pid=4783 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:01.343000 audit[4783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffc866a9b0 a2=0 a3=ffffa3bde6c0 items=0 ppid=2745 pid=4783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:01.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:02.039129 systemd[1]: run-containerd-runc-k8s.io-658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803-runc.BRx7we.mount: Deactivated successfully. Feb 9 18:59:02.716167 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3736094249.mount: Deactivated successfully. Feb 9 18:59:02.716488 systemd-networkd[1532]: calibeaab50c944: Gained IPv6LL Feb 9 18:59:02.872962 env[1381]: time="2024-02-09T18:59:02.872917717Z" level=info msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.913 [INFO][4802] k8s.go 578: Cleaning up netns ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.914 [INFO][4802] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" iface="eth0" netns="/var/run/netns/cni-8a81eba2-ce61-4c74-9ed5-30ccbe856494" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.914 [INFO][4802] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" iface="eth0" netns="/var/run/netns/cni-8a81eba2-ce61-4c74-9ed5-30ccbe856494" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.914 [INFO][4802] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" iface="eth0" netns="/var/run/netns/cni-8a81eba2-ce61-4c74-9ed5-30ccbe856494" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.914 [INFO][4802] k8s.go 585: Releasing IP address(es) ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.916 [INFO][4802] utils.go 188: Calico CNI releasing IP address ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.950 [INFO][4808] ipam_plugin.go 415: Releasing address using handleID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.950 [INFO][4808] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.950 [INFO][4808] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.960 [WARNING][4808] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.960 [INFO][4808] ipam_plugin.go 443: Releasing address using workloadID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.961 [INFO][4808] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:02.964413 env[1381]: 2024-02-09 18:59:02.963 [INFO][4802] k8s.go 591: Teardown processing complete. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:02.966778 systemd[1]: run-netns-cni\x2d8a81eba2\x2dce61\x2d4c74\x2d9ed5\x2d30ccbe856494.mount: Deactivated successfully. Feb 9 18:59:02.967930 env[1381]: time="2024-02-09T18:59:02.967785946Z" level=info msg="TearDown network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" successfully" Feb 9 18:59:02.967930 env[1381]: time="2024-02-09T18:59:02.967826027Z" level=info msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" returns successfully" Feb 9 18:59:02.968866 env[1381]: time="2024-02-09T18:59:02.968806433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gbxpr,Uid:049837c9-e835-4853-993b-156aeaf6d766,Namespace:calico-system,Attempt:1,}" Feb 9 18:59:03.252475 systemd-networkd[1532]: cali576fb06f9e5: Link UP Feb 9 18:59:03.264389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:59:03.264546 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali576fb06f9e5: link becomes ready Feb 9 18:59:03.268197 systemd-networkd[1532]: cali576fb06f9e5: Gained carrier Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.065 [INFO][4816] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0 csi-node-driver- calico-system 049837c9-e835-4853-993b-156aeaf6d766 800 0 2024-02-09 18:58:31 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 csi-node-driver-gbxpr eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali576fb06f9e5 [] []}} ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.066 [INFO][4816] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.102 [INFO][4828] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" HandleID="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.115 [INFO][4828] ipam_plugin.go 268: Auto assigning IP ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" HandleID="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025fc50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-71d57399a1", "pod":"csi-node-driver-gbxpr", "timestamp":"2024-02-09 18:59:03.102558992 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.115 [INFO][4828] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.115 [INFO][4828] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.115 [INFO][4828] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.117 [INFO][4828] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.121 [INFO][4828] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.124 [INFO][4828] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.126 [INFO][4828] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.128 [INFO][4828] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.128 [INFO][4828] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.129 [INFO][4828] ipam.go 1682: Creating new handle: k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.132 [INFO][4828] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.247 [INFO][4828] ipam.go 1216: Successfully claimed IPs: [192.168.120.132/26] block=192.168.120.128/26 handle="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.248 [INFO][4828] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.132/26] handle="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.248 [INFO][4828] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:03.286427 env[1381]: 2024-02-09 18:59:03.248 [INFO][4828] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.132/26] IPv6=[] ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" HandleID="k8s-pod-network.6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.249 [INFO][4816] k8s.go 385: Populated endpoint ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"049837c9-e835-4853-993b-156aeaf6d766", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"csi-node-driver-gbxpr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.120.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali576fb06f9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.249 [INFO][4816] k8s.go 386: Calico CNI using IPs: [192.168.120.132/32] ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.249 [INFO][4816] dataplane_linux.go 68: Setting the host side veth name to cali576fb06f9e5 ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.267 [INFO][4816] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.271 [INFO][4816] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"049837c9-e835-4853-993b-156aeaf6d766", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b", Pod:"csi-node-driver-gbxpr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.120.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali576fb06f9e5", MAC:"0e:56:e5:bf:a8:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:03.287036 env[1381]: 2024-02-09 18:59:03.284 [INFO][4816] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b" Namespace="calico-system" Pod="csi-node-driver-gbxpr" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:03.341000 audit[4850]: NETFILTER_CFG table=filter:134 family=2 entries=42 op=nft_register_chain pid=4850 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:59:03.347819 kernel: kauditd_printk_skb: 398 callbacks suppressed Feb 9 18:59:03.347929 kernel: audit: type=1325 audit(1707505143.341:1331): table=filter:134 family=2 entries=42 op=nft_register_chain pid=4850 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:59:03.341000 audit[4850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffec0f0f50 a2=0 a3=ffffafbdffa8 items=0 ppid=4135 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.374828 env[1381]: time="2024-02-09T18:59:03.374762656Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:59:03.375308 env[1381]: time="2024-02-09T18:59:03.375280580Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:59:03.375427 env[1381]: time="2024-02-09T18:59:03.375404541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:59:03.375638 env[1381]: time="2024-02-09T18:59:03.375611702Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b pid=4857 runtime=io.containerd.runc.v2 Feb 9 18:59:03.392104 kernel: audit: type=1300 audit(1707505143.341:1331): arch=c00000b7 syscall=211 success=yes exit=20696 a0=3 a1=ffffec0f0f50 a2=0 a3=ffffafbdffa8 items=0 ppid=4135 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.341000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:59:03.408786 kernel: audit: type=1327 audit(1707505143.341:1331): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:59:03.435073 systemd[1]: run-containerd-runc-k8s.io-6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b-runc.wiyvjM.mount: Deactivated successfully. Feb 9 18:59:03.436781 systemd[1]: Started cri-containerd-6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b.scope. Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.496391 kernel: audit: type=1400 audit(1707505143.455:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.496514 kernel: audit: type=1400 audit(1707505143.455:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.520421 kernel: audit: type=1400 audit(1707505143.455:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.520633 kernel: audit: type=1400 audit(1707505143.455:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.556453 kernel: audit: type=1400 audit(1707505143.455:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.575414 kernel: audit: type=1400 audit(1707505143.455:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.593647 kernel: audit: type=1400 audit(1707505143.455:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.593810 env[1381]: time="2024-02-09T18:59:03.593734692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gbxpr,Uid:049837c9-e835-4853-993b-156aeaf6d766,Namespace:calico-system,Attempt:1,} returns sandbox id \"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b\"" Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.455000 audit: BPF prog-id=184 op=LOAD Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4857 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666323630643264333162363463333538393533336137366432396135 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4857 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666323630643264333162363463333538393533336137366432396135 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.456000 audit: BPF prog-id=185 op=LOAD Feb 9 18:59:03.456000 audit[4864]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4857 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666323630643264333162363463333538393533336137366432396135 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.473000 audit: BPF prog-id=186 op=LOAD Feb 9 18:59:03.473000 audit[4864]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4857 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666323630643264333162363463333538393533336137366432396135 Feb 9 18:59:03.474000 audit: BPF prog-id=186 op=UNLOAD Feb 9 18:59:03.474000 audit: BPF prog-id=185 op=UNLOAD Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { perfmon } for pid=4864 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit[4864]: AVC avc: denied { bpf } for pid=4864 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:03.474000 audit: BPF prog-id=187 op=LOAD Feb 9 18:59:03.474000 audit[4864]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4857 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:03.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666323630643264333162363463333538393533336137366432396135 Feb 9 18:59:03.992156 env[1381]: time="2024-02-09T18:59:03.992115543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:04.001596 env[1381]: time="2024-02-09T18:59:04.001551885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:04.008349 env[1381]: time="2024-02-09T18:59:04.008310649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:04.015693 env[1381]: time="2024-02-09T18:59:04.015647496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:04.016087 env[1381]: time="2024-02-09T18:59:04.016060979Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 9 18:59:04.019428 env[1381]: time="2024-02-09T18:59:04.019381080Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:59:04.028009 env[1381]: time="2024-02-09T18:59:04.027958416Z" level=info msg="CreateContainer within sandbox \"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 18:59:04.073226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount705545163.mount: Deactivated successfully. Feb 9 18:59:04.104890 env[1381]: time="2024-02-09T18:59:04.104853674Z" level=info msg="CreateContainer within sandbox \"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4\"" Feb 9 18:59:04.106302 env[1381]: time="2024-02-09T18:59:04.106275404Z" level=info msg="StartContainer for \"d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4\"" Feb 9 18:59:04.128938 systemd[1]: Started cri-containerd-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4.scope. Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.175000 audit: BPF prog-id=188 op=LOAD Feb 9 18:59:04.176000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.176000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4724 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:04.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656563386336326335366238333761306462633236633138643366 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4724 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:04.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656563386336326335366238333761306462633236633138643366 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit: BPF prog-id=189 op=LOAD Feb 9 18:59:04.177000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4724 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:04.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656563386336326335366238333761306462633236633138643366 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit: BPF prog-id=190 op=LOAD Feb 9 18:59:04.177000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4724 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:04.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656563386336326335366238333761306462633236633138643366 Feb 9 18:59:04.177000 audit: BPF prog-id=190 op=UNLOAD Feb 9 18:59:04.177000 audit: BPF prog-id=189 op=UNLOAD Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { perfmon } for pid=4900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit[4900]: AVC avc: denied { bpf } for pid=4900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:04.177000 audit: BPF prog-id=191 op=LOAD Feb 9 18:59:04.177000 audit[4900]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4724 pid=4900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:04.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433656563386336326335366238333761306462633236633138643366 Feb 9 18:59:04.228321 env[1381]: time="2024-02-09T18:59:04.228286195Z" level=info msg="StartContainer for \"d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4\" returns successfully" Feb 9 18:59:04.893460 systemd-networkd[1532]: cali576fb06f9e5: Gained IPv6LL Feb 9 18:59:05.039506 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.aL8daA.mount: Deactivated successfully. Feb 9 18:59:05.157301 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.bbOp43.mount: Deactivated successfully. Feb 9 18:59:05.200555 kubelet[2547]: I0209 18:59:05.200442 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-785cf47668-ljfpm" podStartSLOduration=-9.223372005654373e+09 pod.CreationTimestamp="2024-02-09 18:58:34 +0000 UTC" firstStartedPulling="2024-02-09 18:59:01.289320842 +0000 UTC m=+49.636850697" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:05.149057872 +0000 UTC m=+53.496587727" watchObservedRunningTime="2024-02-09 18:59:05.200402041 +0000 UTC m=+53.547931896" Feb 9 18:59:05.901260 env[1381]: time="2024-02-09T18:59:05.901207814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:05.910139 env[1381]: time="2024-02-09T18:59:05.910088831Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:05.918241 env[1381]: time="2024-02-09T18:59:05.918202163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:05.926833 env[1381]: time="2024-02-09T18:59:05.926776378Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:05.927692 env[1381]: time="2024-02-09T18:59:05.927655383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 18:59:05.930163 env[1381]: time="2024-02-09T18:59:05.930112639Z" level=info msg="CreateContainer within sandbox \"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:59:05.998224 env[1381]: time="2024-02-09T18:59:05.998165075Z" level=info msg="CreateContainer within sandbox \"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7dc4d2350fe537e1077049b4d5b91354c155c63f91e3b053933524affd13c1fa\"" Feb 9 18:59:05.999084 env[1381]: time="2024-02-09T18:59:05.999053281Z" level=info msg="StartContainer for \"7dc4d2350fe537e1077049b4d5b91354c155c63f91e3b053933524affd13c1fa\"" Feb 9 18:59:06.018586 systemd[1]: Started cri-containerd-7dc4d2350fe537e1077049b4d5b91354c155c63f91e3b053933524affd13c1fa.scope. Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4857 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:06.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633464323335306665353337653130373730343962346435623931 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit: BPF prog-id=192 op=LOAD Feb 9 18:59:06.044000 audit[4955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4857 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:06.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633464323335306665353337653130373730343962346435623931 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit: BPF prog-id=193 op=LOAD Feb 9 18:59:06.044000 audit[4955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4857 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:06.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633464323335306665353337653130373730343962346435623931 Feb 9 18:59:06.044000 audit: BPF prog-id=193 op=UNLOAD Feb 9 18:59:06.044000 audit: BPF prog-id=192 op=UNLOAD Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { perfmon } for pid=4955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit[4955]: AVC avc: denied { bpf } for pid=4955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:06.044000 audit: BPF prog-id=194 op=LOAD Feb 9 18:59:06.044000 audit[4955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4857 pid=4955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:06.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633464323335306665353337653130373730343962346435623931 Feb 9 18:59:06.063542 env[1381]: time="2024-02-09T18:59:06.063468810Z" level=info msg="StartContainer for \"7dc4d2350fe537e1077049b4d5b91354c155c63f91e3b053933524affd13c1fa\" returns successfully" Feb 9 18:59:06.066759 env[1381]: time="2024-02-09T18:59:06.066715910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:59:07.512000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:07.512000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001dd8440 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:07.512000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:07.512000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:07.512000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000833680 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:07.512000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:07.814060 env[1381]: time="2024-02-09T18:59:07.813930337Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:07.826311 env[1381]: time="2024-02-09T18:59:07.826184334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:07.834466 env[1381]: time="2024-02-09T18:59:07.834421706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:07.842332 env[1381]: time="2024-02-09T18:59:07.842291315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:07.843094 env[1381]: time="2024-02-09T18:59:07.843065840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 18:59:07.845350 env[1381]: time="2024-02-09T18:59:07.845319294Z" level=info msg="CreateContainer within sandbox \"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:59:07.902352 env[1381]: time="2024-02-09T18:59:07.902297972Z" level=info msg="CreateContainer within sandbox \"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ece1faf8a7c4d78ff4f330a92c3b64f6050a4b2a12d4602b252658d350918ee7\"" Feb 9 18:59:07.902870 env[1381]: time="2024-02-09T18:59:07.902845815Z" level=info msg="StartContainer for \"ece1faf8a7c4d78ff4f330a92c3b64f6050a4b2a12d4602b252658d350918ee7\"" Feb 9 18:59:07.923062 systemd[1]: Started cri-containerd-ece1faf8a7c4d78ff4f330a92c3b64f6050a4b2a12d4602b252658d350918ee7.scope. Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4857 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:07.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563653166616638613763346437386666346633333061393263336236 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit: BPF prog-id=195 op=LOAD Feb 9 18:59:07.974000 audit[4995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4857 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:07.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563653166616638613763346437386666346633333061393263336236 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit: BPF prog-id=196 op=LOAD Feb 9 18:59:07.974000 audit[4995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4857 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:07.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563653166616638613763346437386666346633333061393263336236 Feb 9 18:59:07.974000 audit: BPF prog-id=196 op=UNLOAD Feb 9 18:59:07.974000 audit: BPF prog-id=195 op=UNLOAD Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { perfmon } for pid=4995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit[4995]: AVC avc: denied { bpf } for pid=4995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:07.974000 audit: BPF prog-id=197 op=LOAD Feb 9 18:59:07.974000 audit[4995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4857 pid=4995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:07.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563653166616638613763346437386666346633333061393263336236 Feb 9 18:59:08.074351 env[1381]: time="2024-02-09T18:59:08.074240966Z" level=info msg="StartContainer for \"ece1faf8a7c4d78ff4f330a92c3b64f6050a4b2a12d4602b252658d350918ee7\" returns successfully" Feb 9 18:59:08.148807 kubelet[2547]: I0209 18:59:08.148777 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-gbxpr" podStartSLOduration=-9.223371999706047e+09 pod.CreationTimestamp="2024-02-09 18:58:31 +0000 UTC" firstStartedPulling="2024-02-09 18:59:03.596412509 +0000 UTC m=+51.943942324" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:08.14731242 +0000 UTC m=+56.494842275" watchObservedRunningTime="2024-02-09 18:59:08.148728069 +0000 UTC m=+56.496257884" Feb 9 18:59:08.241000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.241000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=401403bb30 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.241000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.249000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.249000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4014110570 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.249000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.249000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=400e6fa5a0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.293000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.293000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400e249290 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.293000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.293000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400e6fb580 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.293000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.293000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.293000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:08.293000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40141117d0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 18:59:08.293000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 18:59:08.883477 systemd[1]: run-containerd-runc-k8s.io-ece1faf8a7c4d78ff4f330a92c3b64f6050a4b2a12d4602b252658d350918ee7-runc.dSgqtt.mount: Deactivated successfully. Feb 9 18:59:08.957587 kubelet[2547]: I0209 18:59:08.957562 2547 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:59:08.957775 kubelet[2547]: I0209 18:59:08.957766 2547 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:59:11.742925 env[1381]: time="2024-02-09T18:59:11.742869792Z" level=info msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.782 [WARNING][5043] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"049837c9-e835-4853-993b-156aeaf6d766", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b", Pod:"csi-node-driver-gbxpr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.120.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali576fb06f9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.783 [INFO][5043] k8s.go 578: Cleaning up netns ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.783 [INFO][5043] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" iface="eth0" netns="" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.783 [INFO][5043] k8s.go 585: Releasing IP address(es) ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.783 [INFO][5043] utils.go 188: Calico CNI releasing IP address ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.801 [INFO][5049] ipam_plugin.go 415: Releasing address using handleID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.802 [INFO][5049] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.802 [INFO][5049] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.815 [WARNING][5049] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.815 [INFO][5049] ipam_plugin.go 443: Releasing address using workloadID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.816 [INFO][5049] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:11.819241 env[1381]: 2024-02-09 18:59:11.818 [INFO][5043] k8s.go 591: Teardown processing complete. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.819805 env[1381]: time="2024-02-09T18:59:11.819771016Z" level=info msg="TearDown network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" successfully" Feb 9 18:59:11.819872 env[1381]: time="2024-02-09T18:59:11.819856057Z" level=info msg="StopPodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" returns successfully" Feb 9 18:59:11.820523 env[1381]: time="2024-02-09T18:59:11.820497581Z" level=info msg="RemovePodSandbox for \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" Feb 9 18:59:11.820742 env[1381]: time="2024-02-09T18:59:11.820700862Z" level=info msg="Forcibly stopping sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\"" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.858 [WARNING][5069] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"049837c9-e835-4853-993b-156aeaf6d766", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"6f260d2d31b64c3589533a76d29a5ce1c15b0ab51577130fd71154b891526c5b", Pod:"csi-node-driver-gbxpr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.120.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali576fb06f9e5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.859 [INFO][5069] k8s.go 578: Cleaning up netns ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.859 [INFO][5069] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" iface="eth0" netns="" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.859 [INFO][5069] k8s.go 585: Releasing IP address(es) ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.859 [INFO][5069] utils.go 188: Calico CNI releasing IP address ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.880 [INFO][5076] ipam_plugin.go 415: Releasing address using handleID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.881 [INFO][5076] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.881 [INFO][5076] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.890 [WARNING][5076] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.890 [INFO][5076] ipam_plugin.go 443: Releasing address using workloadID ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" HandleID="k8s-pod-network.35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Workload="ci--3510.3.2--a--71d57399a1-k8s-csi--node--driver--gbxpr-eth0" Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.892 [INFO][5076] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:11.894397 env[1381]: 2024-02-09 18:59:11.893 [INFO][5069] k8s.go 591: Teardown processing complete. ContainerID="35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb" Feb 9 18:59:11.895049 env[1381]: time="2024-02-09T18:59:11.895017470Z" level=info msg="TearDown network for sandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" successfully" Feb 9 18:59:11.911355 env[1381]: time="2024-02-09T18:59:11.911304528Z" level=info msg="RemovePodSandbox \"35730c8a7adee1c5bb605e205aae7759612961a882b3bca0271c27645bccf7eb\" returns successfully" Feb 9 18:59:11.912050 env[1381]: time="2024-02-09T18:59:11.912015652Z" level=info msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.952 [WARNING][5096] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0", GenerateName:"calico-kube-controllers-785cf47668-", Namespace:"calico-system", SelfLink:"", UID:"22732269-01df-4c3c-b9cc-125299dec8ca", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cf47668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803", Pod:"calico-kube-controllers-785cf47668-ljfpm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibeaab50c944", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.953 [INFO][5096] k8s.go 578: Cleaning up netns ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.953 [INFO][5096] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" iface="eth0" netns="" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.953 [INFO][5096] k8s.go 585: Releasing IP address(es) ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.953 [INFO][5096] utils.go 188: Calico CNI releasing IP address ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.969 [INFO][5102] ipam_plugin.go 415: Releasing address using handleID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.969 [INFO][5102] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.970 [INFO][5102] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.979 [WARNING][5102] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.979 [INFO][5102] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.980 [INFO][5102] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:11.983082 env[1381]: 2024-02-09 18:59:11.981 [INFO][5096] k8s.go 591: Teardown processing complete. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:11.983695 env[1381]: time="2024-02-09T18:59:11.983661004Z" level=info msg="TearDown network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" successfully" Feb 9 18:59:11.983764 env[1381]: time="2024-02-09T18:59:11.983748285Z" level=info msg="StopPodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" returns successfully" Feb 9 18:59:11.984240 env[1381]: time="2024-02-09T18:59:11.984219048Z" level=info msg="RemovePodSandbox for \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" Feb 9 18:59:11.984405 env[1381]: time="2024-02-09T18:59:11.984365169Z" level=info msg="Forcibly stopping sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\"" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.042 [WARNING][5120] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0", GenerateName:"calico-kube-controllers-785cf47668-", Namespace:"calico-system", SelfLink:"", UID:"22732269-01df-4c3c-b9cc-125299dec8ca", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"785cf47668", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"658b9ef04b1ca322614f8d6cb261c3ca0e0f8213fb38599975d801e404c65803", Pod:"calico-kube-controllers-785cf47668-ljfpm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.120.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibeaab50c944", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.042 [INFO][5120] k8s.go 578: Cleaning up netns ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.042 [INFO][5120] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" iface="eth0" netns="" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.042 [INFO][5120] k8s.go 585: Releasing IP address(es) ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.042 [INFO][5120] utils.go 188: Calico CNI releasing IP address ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.059 [INFO][5126] ipam_plugin.go 415: Releasing address using handleID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.060 [INFO][5126] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.060 [INFO][5126] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.069 [WARNING][5126] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.069 [INFO][5126] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" HandleID="k8s-pod-network.5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--kube--controllers--785cf47668--ljfpm-eth0" Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.071 [INFO][5126] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:12.074688 env[1381]: 2024-02-09 18:59:12.072 [INFO][5120] k8s.go 591: Teardown processing complete. ContainerID="5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d" Feb 9 18:59:12.074688 env[1381]: time="2024-02-09T18:59:12.073241180Z" level=info msg="TearDown network for sandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" successfully" Feb 9 18:59:12.095160 env[1381]: time="2024-02-09T18:59:12.095110951Z" level=info msg="RemovePodSandbox \"5ce7c0ffc130bd4503aa6bc70d05707fac354bbbd04774067e00faf648e5369d\" returns successfully" Feb 9 18:59:12.095617 env[1381]: time="2024-02-09T18:59:12.095593634Z" level=info msg="StopPodSandbox for \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\"" Feb 9 18:59:12.095850 env[1381]: time="2024-02-09T18:59:12.095808875Z" level=info msg="TearDown network for sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" successfully" Feb 9 18:59:12.095950 env[1381]: time="2024-02-09T18:59:12.095934556Z" level=info msg="StopPodSandbox for \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" returns successfully" Feb 9 18:59:12.096375 env[1381]: time="2024-02-09T18:59:12.096351398Z" level=info msg="RemovePodSandbox for \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\"" Feb 9 18:59:12.096554 env[1381]: time="2024-02-09T18:59:12.096519839Z" level=info msg="Forcibly stopping sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\"" Feb 9 18:59:12.096675 env[1381]: time="2024-02-09T18:59:12.096656800Z" level=info msg="TearDown network for sandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" successfully" Feb 9 18:59:12.117542 env[1381]: time="2024-02-09T18:59:12.117492245Z" level=info msg="RemovePodSandbox \"efae5407b509ffda504d3e3270177cb7d133dbd8c804e52649a608f2e5468bde\" returns successfully" Feb 9 18:59:12.118231 env[1381]: time="2024-02-09T18:59:12.118204689Z" level=info msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.155 [WARNING][5144] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3ee7527c-7e35-45be-866e-4a616a725c82", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a", Pod:"coredns-787d4945fb-6tvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e21c6b06d4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.155 [INFO][5144] k8s.go 578: Cleaning up netns ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.155 [INFO][5144] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" iface="eth0" netns="" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.155 [INFO][5144] k8s.go 585: Releasing IP address(es) ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.155 [INFO][5144] utils.go 188: Calico CNI releasing IP address ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.172 [INFO][5150] ipam_plugin.go 415: Releasing address using handleID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.172 [INFO][5150] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.173 [INFO][5150] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.182 [WARNING][5150] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.182 [INFO][5150] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.183 [INFO][5150] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:12.186138 env[1381]: 2024-02-09 18:59:12.184 [INFO][5144] k8s.go 591: Teardown processing complete. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.186625 env[1381]: time="2024-02-09T18:59:12.186177295Z" level=info msg="TearDown network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" successfully" Feb 9 18:59:12.186625 env[1381]: time="2024-02-09T18:59:12.186208975Z" level=info msg="StopPodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" returns successfully" Feb 9 18:59:12.186946 env[1381]: time="2024-02-09T18:59:12.186904179Z" level=info msg="RemovePodSandbox for \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" Feb 9 18:59:12.187088 env[1381]: time="2024-02-09T18:59:12.187050780Z" level=info msg="Forcibly stopping sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\"" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.223 [WARNING][5168] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"3ee7527c-7e35-45be-866e-4a616a725c82", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"28869c774c78e916e70eb8b04f7a1691304a0cc552bce3d9474a4773e964e59a", Pod:"coredns-787d4945fb-6tvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2e21c6b06d4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.224 [INFO][5168] k8s.go 578: Cleaning up netns ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.224 [INFO][5168] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" iface="eth0" netns="" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.224 [INFO][5168] k8s.go 585: Releasing IP address(es) ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.224 [INFO][5168] utils.go 188: Calico CNI releasing IP address ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.242 [INFO][5175] ipam_plugin.go 415: Releasing address using handleID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.242 [INFO][5175] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.242 [INFO][5175] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.251 [WARNING][5175] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.251 [INFO][5175] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" HandleID="k8s-pod-network.87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--6tvxj-eth0" Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.253 [INFO][5175] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:12.255513 env[1381]: 2024-02-09 18:59:12.254 [INFO][5168] k8s.go 591: Teardown processing complete. ContainerID="87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4" Feb 9 18:59:12.255968 env[1381]: time="2024-02-09T18:59:12.255550629Z" level=info msg="TearDown network for sandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" successfully" Feb 9 18:59:12.273921 env[1381]: time="2024-02-09T18:59:12.273867659Z" level=info msg="RemovePodSandbox \"87c2d68d9ee3c133f522bf2c8ca2fa56d90de27854139f5d37ef836bb349dbf4\" returns successfully" Feb 9 18:59:12.274553 env[1381]: time="2024-02-09T18:59:12.274529623Z" level=info msg="StopPodSandbox for \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\"" Feb 9 18:59:12.274817 env[1381]: time="2024-02-09T18:59:12.274777384Z" level=info msg="TearDown network for sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" successfully" Feb 9 18:59:12.274896 env[1381]: time="2024-02-09T18:59:12.274881185Z" level=info msg="StopPodSandbox for \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" returns successfully" Feb 9 18:59:12.275217 env[1381]: time="2024-02-09T18:59:12.275196707Z" level=info msg="RemovePodSandbox for \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\"" Feb 9 18:59:12.275348 env[1381]: time="2024-02-09T18:59:12.275316227Z" level=info msg="Forcibly stopping sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\"" Feb 9 18:59:12.275465 env[1381]: time="2024-02-09T18:59:12.275448348Z" level=info msg="TearDown network for sandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" successfully" Feb 9 18:59:12.293149 env[1381]: time="2024-02-09T18:59:12.293085053Z" level=info msg="RemovePodSandbox \"d8ab52e68b1678d739c85380ee9a5da2e7c65b11dd0eff3cc3079d9e368182c9\" returns successfully" Feb 9 18:59:12.293879 env[1381]: time="2024-02-09T18:59:12.293855778Z" level=info msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.327 [WARNING][5193] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d1709403-da29-4851-968a-907c9a5fb840", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540", Pod:"coredns-787d4945fb-lmjrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califaefcd86bfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.327 [INFO][5193] k8s.go 578: Cleaning up netns ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.327 [INFO][5193] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" iface="eth0" netns="" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.327 [INFO][5193] k8s.go 585: Releasing IP address(es) ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.327 [INFO][5193] utils.go 188: Calico CNI releasing IP address ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.345 [INFO][5199] ipam_plugin.go 415: Releasing address using handleID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.345 [INFO][5199] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.345 [INFO][5199] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.358 [WARNING][5199] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.358 [INFO][5199] ipam_plugin.go 443: Releasing address using workloadID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.362 [INFO][5199] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:12.366319 env[1381]: 2024-02-09 18:59:12.363 [INFO][5193] k8s.go 591: Teardown processing complete. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.366977 env[1381]: time="2024-02-09T18:59:12.366935935Z" level=info msg="TearDown network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" successfully" Feb 9 18:59:12.367059 env[1381]: time="2024-02-09T18:59:12.367043415Z" level=info msg="StopPodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" returns successfully" Feb 9 18:59:12.367841 env[1381]: time="2024-02-09T18:59:12.367811060Z" level=info msg="RemovePodSandbox for \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" Feb 9 18:59:12.368048 env[1381]: time="2024-02-09T18:59:12.368008221Z" level=info msg="Forcibly stopping sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\"" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.403 [WARNING][5217] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"d1709403-da29-4851-968a-907c9a5fb840", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 58, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"431e5e2683cc47011e01baf323c244a913292d9a82879316e8161b8f9acda540", Pod:"coredns-787d4945fb-lmjrz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.120.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califaefcd86bfc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.403 [INFO][5217] k8s.go 578: Cleaning up netns ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.403 [INFO][5217] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" iface="eth0" netns="" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.403 [INFO][5217] k8s.go 585: Releasing IP address(es) ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.403 [INFO][5217] utils.go 188: Calico CNI releasing IP address ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.421 [INFO][5223] ipam_plugin.go 415: Releasing address using handleID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.421 [INFO][5223] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.421 [INFO][5223] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.435 [WARNING][5223] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.435 [INFO][5223] ipam_plugin.go 443: Releasing address using workloadID ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" HandleID="k8s-pod-network.80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Workload="ci--3510.3.2--a--71d57399a1-k8s-coredns--787d4945fb--lmjrz-eth0" Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.436 [INFO][5223] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:12.438944 env[1381]: 2024-02-09 18:59:12.437 [INFO][5217] k8s.go 591: Teardown processing complete. ContainerID="80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42" Feb 9 18:59:12.439521 env[1381]: time="2024-02-09T18:59:12.439476768Z" level=info msg="TearDown network for sandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" successfully" Feb 9 18:59:12.451914 env[1381]: time="2024-02-09T18:59:12.451868802Z" level=info msg="RemovePodSandbox \"80c427d88fdc9d73f33441411e67d4a1d70cfb5c746f97a992bbd694a386de42\" returns successfully" Feb 9 18:59:16.931836 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.dBjJFM.mount: Deactivated successfully. Feb 9 18:59:20.083718 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.vIhcrh.mount: Deactivated successfully. Feb 9 18:59:23.646000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.652493 kernel: kauditd_printk_skb: 217 callbacks suppressed Feb 9 18:59:23.652632 kernel: audit: type=1400 audit(1707505163.646:1388): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.646000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001355e00 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.705857 kernel: audit: type=1300 audit(1707505163.646:1388): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001355e00 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.730749 kernel: audit: type=1327 audit(1707505163.646:1388): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.649000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.754325 kernel: audit: type=1400 audit(1707505163.649:1389): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.754458 kernel: audit: type=1300 audit(1707505163.649:1389): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f484a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.649000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f484a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.811932 kernel: audit: type=1327 audit(1707505163.649:1389): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.812089 kernel: audit: type=1400 audit(1707505163.649:1390): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.649000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.649000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f484c0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.867771 kernel: audit: type=1300 audit(1707505163.649:1390): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f484c0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.893464 kernel: audit: type=1327 audit(1707505163.649:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:23.893606 kernel: audit: type=1400 audit(1707505163.649:1391): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.649000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 18:59:23.649000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f484e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 18:59:23.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 18:59:25.376378 kubelet[2547]: I0209 18:59:25.376343 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:59:25.382022 systemd[1]: Created slice kubepods-besteffort-pod461bf5c0_7624_4c18_931f_b59e7432a2ed.slice. Feb 9 18:59:25.396046 kubelet[2547]: I0209 18:59:25.396004 2547 topology_manager.go:210] "Topology Admit Handler" Feb 9 18:59:25.400714 systemd[1]: Created slice kubepods-besteffort-pod34b30e19_4ead_4bcd_b9e7_07d38cea1312.slice. Feb 9 18:59:25.422499 kubelet[2547]: I0209 18:59:25.422459 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/461bf5c0-7624-4c18-931f-b59e7432a2ed-calico-apiserver-certs\") pod \"calico-apiserver-8547f6b544-m9s2d\" (UID: \"461bf5c0-7624-4c18-931f-b59e7432a2ed\") " pod="calico-apiserver/calico-apiserver-8547f6b544-m9s2d" Feb 9 18:59:25.422652 kubelet[2547]: I0209 18:59:25.422510 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dxlht\" (UniqueName: \"kubernetes.io/projected/461bf5c0-7624-4c18-931f-b59e7432a2ed-kube-api-access-dxlht\") pod \"calico-apiserver-8547f6b544-m9s2d\" (UID: \"461bf5c0-7624-4c18-931f-b59e7432a2ed\") " pod="calico-apiserver/calico-apiserver-8547f6b544-m9s2d" Feb 9 18:59:25.422652 kubelet[2547]: I0209 18:59:25.422533 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/34b30e19-4ead-4bcd-b9e7-07d38cea1312-calico-apiserver-certs\") pod \"calico-apiserver-8547f6b544-dvhzm\" (UID: \"34b30e19-4ead-4bcd-b9e7-07d38cea1312\") " pod="calico-apiserver/calico-apiserver-8547f6b544-dvhzm" Feb 9 18:59:25.422652 kubelet[2547]: I0209 18:59:25.422564 2547 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r4rhj\" (UniqueName: \"kubernetes.io/projected/34b30e19-4ead-4bcd-b9e7-07d38cea1312-kube-api-access-r4rhj\") pod \"calico-apiserver-8547f6b544-dvhzm\" (UID: \"34b30e19-4ead-4bcd-b9e7-07d38cea1312\") " pod="calico-apiserver/calico-apiserver-8547f6b544-dvhzm" Feb 9 18:59:25.470000 audit[5308]: NETFILTER_CFG table=filter:135 family=2 entries=7 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:25.470000 audit[5308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe6b446a0 a2=0 a3=ffffa80a46c0 items=0 ppid=2745 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:25.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:25.473000 audit[5308]: NETFILTER_CFG table=nat:136 family=2 entries=78 op=nft_register_rule pid=5308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:25.473000 audit[5308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe6b446a0 a2=0 a3=ffffa80a46c0 items=0 ppid=2745 pid=5308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:25.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:25.524199 kubelet[2547]: E0209 18:59:25.524157 2547 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 18:59:25.524371 kubelet[2547]: E0209 18:59:25.524216 2547 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/461bf5c0-7624-4c18-931f-b59e7432a2ed-calico-apiserver-certs podName:461bf5c0-7624-4c18-931f-b59e7432a2ed nodeName:}" failed. No retries permitted until 2024-02-09 18:59:26.024199136 +0000 UTC m=+74.371728991 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/461bf5c0-7624-4c18-931f-b59e7432a2ed-calico-apiserver-certs") pod "calico-apiserver-8547f6b544-m9s2d" (UID: "461bf5c0-7624-4c18-931f-b59e7432a2ed") : secret "calico-apiserver-certs" not found Feb 9 18:59:25.524584 kubelet[2547]: E0209 18:59:25.524550 2547 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 18:59:25.524641 kubelet[2547]: E0209 18:59:25.524590 2547 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/34b30e19-4ead-4bcd-b9e7-07d38cea1312-calico-apiserver-certs podName:34b30e19-4ead-4bcd-b9e7-07d38cea1312 nodeName:}" failed. No retries permitted until 2024-02-09 18:59:26.024580218 +0000 UTC m=+74.372110033 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/34b30e19-4ead-4bcd-b9e7-07d38cea1312-calico-apiserver-certs") pod "calico-apiserver-8547f6b544-dvhzm" (UID: "34b30e19-4ead-4bcd-b9e7-07d38cea1312") : secret "calico-apiserver-certs" not found Feb 9 18:59:25.544000 audit[5335]: NETFILTER_CFG table=filter:137 family=2 entries=8 op=nft_register_rule pid=5335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:25.544000 audit[5335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffde6ce720 a2=0 a3=ffff8b1606c0 items=0 ppid=2745 pid=5335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:25.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:25.546000 audit[5335]: NETFILTER_CFG table=nat:138 family=2 entries=78 op=nft_register_rule pid=5335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:25.546000 audit[5335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffde6ce720 a2=0 a3=ffff8b1606c0 items=0 ppid=2745 pid=5335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:25.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:26.286545 env[1381]: time="2024-02-09T18:59:26.286052622Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8547f6b544-m9s2d,Uid:461bf5c0-7624-4c18-931f-b59e7432a2ed,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:59:26.304958 env[1381]: time="2024-02-09T18:59:26.304908363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8547f6b544-dvhzm,Uid:34b30e19-4ead-4bcd-b9e7-07d38cea1312,Namespace:calico-apiserver,Attempt:0,}" Feb 9 18:59:26.547416 systemd-networkd[1532]: calid3f96936f34: Link UP Feb 9 18:59:26.557824 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:59:26.566221 systemd-networkd[1532]: calid3f96936f34: Gained carrier Feb 9 18:59:26.566411 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid3f96936f34: link becomes ready Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.441 [INFO][5342] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0 calico-apiserver-8547f6b544- calico-apiserver 461bf5c0-7624-4c18-931f-b59e7432a2ed 914 0 2024-02-09 18:59:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8547f6b544 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 calico-apiserver-8547f6b544-m9s2d eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid3f96936f34 [] []}} ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.442 [INFO][5342] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.493 [INFO][5363] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" HandleID="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.508 [INFO][5363] ipam_plugin.go 268: Auto assigning IP ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" HandleID="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000511730), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-71d57399a1", "pod":"calico-apiserver-8547f6b544-m9s2d", "timestamp":"2024-02-09 18:59:26.493915773 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.508 [INFO][5363] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.509 [INFO][5363] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.509 [INFO][5363] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.510 [INFO][5363] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.515 [INFO][5363] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.519 [INFO][5363] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.521 [INFO][5363] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.524 [INFO][5363] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.524 [INFO][5363] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.526 [INFO][5363] ipam.go 1682: Creating new handle: k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3 Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.530 [INFO][5363] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.540 [INFO][5363] ipam.go 1216: Successfully claimed IPs: [192.168.120.133/26] block=192.168.120.128/26 handle="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.540 [INFO][5363] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.133/26] handle="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.541 [INFO][5363] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:26.583771 env[1381]: 2024-02-09 18:59:26.541 [INFO][5363] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.133/26] IPv6=[] ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" HandleID="k8s-pod-network.d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.542 [INFO][5342] k8s.go 385: Populated endpoint ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0", GenerateName:"calico-apiserver-8547f6b544-", Namespace:"calico-apiserver", SelfLink:"", UID:"461bf5c0-7624-4c18-931f-b59e7432a2ed", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8547f6b544", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"calico-apiserver-8547f6b544-m9s2d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid3f96936f34", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.542 [INFO][5342] k8s.go 386: Calico CNI using IPs: [192.168.120.133/32] ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.542 [INFO][5342] dataplane_linux.go 68: Setting the host side veth name to calid3f96936f34 ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.567 [INFO][5342] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.568 [INFO][5342] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0", GenerateName:"calico-apiserver-8547f6b544-", Namespace:"calico-apiserver", SelfLink:"", UID:"461bf5c0-7624-4c18-931f-b59e7432a2ed", ResourceVersion:"914", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8547f6b544", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3", Pod:"calico-apiserver-8547f6b544-m9s2d", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid3f96936f34", MAC:"96:fc:db:0e:a0:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:26.584534 env[1381]: 2024-02-09 18:59:26.580 [INFO][5342] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-m9s2d" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--m9s2d-eth0" Feb 9 18:59:26.618908 env[1381]: time="2024-02-09T18:59:26.618832760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:59:26.619105 env[1381]: time="2024-02-09T18:59:26.619082761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:59:26.619213 env[1381]: time="2024-02-09T18:59:26.619192602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:59:26.619600 env[1381]: time="2024-02-09T18:59:26.619555604Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3 pid=5403 runtime=io.containerd.runc.v2 Feb 9 18:59:26.632000 audit[5408]: NETFILTER_CFG table=filter:139 family=2 entries=59 op=nft_register_chain pid=5408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:59:26.632000 audit[5408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29292 a0=3 a1=ffffd39ee410 a2=0 a3=ffffb0d22fa8 items=0 ppid=4135 pid=5408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.632000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:59:26.638902 systemd[1]: Started cri-containerd-d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3.scope. Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.656000 audit: BPF prog-id=198 op=LOAD Feb 9 18:59:26.657000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.657000 audit[5413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=5403 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323634336566613239356135613962323366666635353734313633 Feb 9 18:59:26.657000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.657000 audit[5413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=5403 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323634336566613239356135613962323366666635353734313633 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit: BPF prog-id=199 op=LOAD Feb 9 18:59:26.658000 audit[5413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=5403 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323634336566613239356135613962323366666635353734313633 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.658000 audit: BPF prog-id=200 op=LOAD Feb 9 18:59:26.658000 audit[5413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=5403 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323634336566613239356135613962323366666635353734313633 Feb 9 18:59:26.659000 audit: BPF prog-id=200 op=UNLOAD Feb 9 18:59:26.659000 audit: BPF prog-id=199 op=UNLOAD Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { perfmon } for pid=5413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit[5413]: AVC avc: denied { bpf } for pid=5413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.659000 audit: BPF prog-id=201 op=LOAD Feb 9 18:59:26.659000 audit[5413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=5403 pid=5413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439323634336566613239356135613962323366666635353734313633 Feb 9 18:59:26.667995 systemd-networkd[1532]: cali751845bd9e8: Link UP Feb 9 18:59:26.679433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali751845bd9e8: link becomes ready Feb 9 18:59:26.676539 systemd-networkd[1532]: cali751845bd9e8: Gained carrier Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.483 [INFO][5353] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0 calico-apiserver-8547f6b544- calico-apiserver 34b30e19-4ead-4bcd-b9e7-07d38cea1312 918 0 2024-02-09 18:59:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8547f6b544 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-71d57399a1 calico-apiserver-8547f6b544-dvhzm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali751845bd9e8 [] []}} ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.483 [INFO][5353] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.535 [INFO][5370] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" HandleID="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.588 [INFO][5370] ipam_plugin.go 268: Auto assigning IP ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" HandleID="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-71d57399a1", "pod":"calico-apiserver-8547f6b544-dvhzm", "timestamp":"2024-02-09 18:59:26.535910317 +0000 UTC"}, Hostname:"ci-3510.3.2-a-71d57399a1", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.588 [INFO][5370] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.588 [INFO][5370] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.588 [INFO][5370] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-71d57399a1' Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.590 [INFO][5370] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.611 [INFO][5370] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.617 [INFO][5370] ipam.go 489: Trying affinity for 192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.629 [INFO][5370] ipam.go 155: Attempting to load block cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.642 [INFO][5370] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.120.128/26 host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.642 [INFO][5370] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.120.128/26 handle="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.644 [INFO][5370] ipam.go 1682: Creating new handle: k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.650 [INFO][5370] ipam.go 1203: Writing block in order to claim IPs block=192.168.120.128/26 handle="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.660 [INFO][5370] ipam.go 1216: Successfully claimed IPs: [192.168.120.134/26] block=192.168.120.128/26 handle="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.663 [INFO][5370] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.120.134/26] handle="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" host="ci-3510.3.2-a-71d57399a1" Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.663 [INFO][5370] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:59:26.694577 env[1381]: 2024-02-09 18:59:26.663 [INFO][5370] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.120.134/26] IPv6=[] ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" HandleID="k8s-pod-network.808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Workload="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.664 [INFO][5353] k8s.go 385: Populated endpoint ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0", GenerateName:"calico-apiserver-8547f6b544-", Namespace:"calico-apiserver", SelfLink:"", UID:"34b30e19-4ead-4bcd-b9e7-07d38cea1312", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8547f6b544", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"", Pod:"calico-apiserver-8547f6b544-dvhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali751845bd9e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.665 [INFO][5353] k8s.go 386: Calico CNI using IPs: [192.168.120.134/32] ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.665 [INFO][5353] dataplane_linux.go 68: Setting the host side veth name to cali751845bd9e8 ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.676 [INFO][5353] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.677 [INFO][5353] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0", GenerateName:"calico-apiserver-8547f6b544-", Namespace:"calico-apiserver", SelfLink:"", UID:"34b30e19-4ead-4bcd-b9e7-07d38cea1312", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 59, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8547f6b544", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-71d57399a1", ContainerID:"808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d", Pod:"calico-apiserver-8547f6b544-dvhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.120.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali751845bd9e8", MAC:"8a:df:c6:6c:52:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:59:26.695147 env[1381]: 2024-02-09 18:59:26.693 [INFO][5353] k8s.go 491: Wrote updated endpoint to datastore ContainerID="808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d" Namespace="calico-apiserver" Pod="calico-apiserver-8547f6b544-dvhzm" WorkloadEndpoint="ci--3510.3.2--a--71d57399a1-k8s-calico--apiserver--8547f6b544--dvhzm-eth0" Feb 9 18:59:26.717000 audit[5454]: NETFILTER_CFG table=filter:140 family=2 entries=50 op=nft_register_chain pid=5454 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:59:26.717000 audit[5454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24496 a0=3 a1=ffffcb40f5a0 a2=0 a3=ffffb8a6cfa8 items=0 ppid=4135 pid=5454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.717000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:59:26.723230 env[1381]: time="2024-02-09T18:59:26.723191037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8547f6b544-m9s2d,Uid:461bf5c0-7624-4c18-931f-b59e7432a2ed,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3\"" Feb 9 18:59:26.724545 env[1381]: time="2024-02-09T18:59:26.724195643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:59:26.724545 env[1381]: time="2024-02-09T18:59:26.724293323Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:59:26.724545 env[1381]: time="2024-02-09T18:59:26.724303763Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:59:26.724545 env[1381]: time="2024-02-09T18:59:26.724411644Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d pid=5458 runtime=io.containerd.runc.v2 Feb 9 18:59:26.725810 env[1381]: time="2024-02-09T18:59:26.725643531Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:59:26.747327 systemd[1]: Started cri-containerd-808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d.scope. Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.756000 audit: BPF prog-id=202 op=LOAD Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5458 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383732386230303237616231353435336136393432663566626135 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5458 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383732386230303237616231353435336136393432663566626135 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit: BPF prog-id=203 op=LOAD Feb 9 18:59:26.757000 audit[5468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5458 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383732386230303237616231353435336136393432663566626135 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit: BPF prog-id=204 op=LOAD Feb 9 18:59:26.757000 audit[5468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5458 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383732386230303237616231353435336136393432663566626135 Feb 9 18:59:26.757000 audit: BPF prog-id=204 op=UNLOAD Feb 9 18:59:26.757000 audit: BPF prog-id=203 op=UNLOAD Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { perfmon } for pid=5468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit[5468]: AVC avc: denied { bpf } for pid=5468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:26.757000 audit: BPF prog-id=205 op=LOAD Feb 9 18:59:26.757000 audit[5468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5458 pid=5468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383732386230303237616231353435336136393432663566626135 Feb 9 18:59:26.786374 env[1381]: time="2024-02-09T18:59:26.786330375Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8547f6b544-dvhzm,Uid:34b30e19-4ead-4bcd-b9e7-07d38cea1312,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d\"" Feb 9 18:59:28.124500 systemd-networkd[1532]: cali751845bd9e8: Gained IPv6LL Feb 9 18:59:28.380471 systemd-networkd[1532]: calid3f96936f34: Gained IPv6LL Feb 9 18:59:30.134211 env[1381]: time="2024-02-09T18:59:30.134156192Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.153009 env[1381]: time="2024-02-09T18:59:30.152953130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.162444 env[1381]: time="2024-02-09T18:59:30.162395979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.185463 env[1381]: time="2024-02-09T18:59:30.185422579Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.185934 env[1381]: time="2024-02-09T18:59:30.185909261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:59:30.187126 env[1381]: time="2024-02-09T18:59:30.187087507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 18:59:30.188389 env[1381]: time="2024-02-09T18:59:30.188357954Z" level=info msg="CreateContainer within sandbox \"d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:59:30.306970 env[1381]: time="2024-02-09T18:59:30.306917931Z" level=info msg="CreateContainer within sandbox \"d92643efa295a5a9b23fff5574163d137b91a9b111fc69d3402b8d2c5789f9e3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855\"" Feb 9 18:59:30.307950 env[1381]: time="2024-02-09T18:59:30.307916417Z" level=info msg="StartContainer for \"fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855\"" Feb 9 18:59:30.337769 systemd[1]: run-containerd-runc-k8s.io-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855-runc.M0PruY.mount: Deactivated successfully. Feb 9 18:59:30.342919 systemd[1]: Started cri-containerd-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855.scope. Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.372949 kernel: kauditd_printk_skb: 134 callbacks suppressed Feb 9 18:59:30.373036 kernel: audit: type=1400 audit(1707505170.365:1434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.411007 kernel: audit: type=1400 audit(1707505170.365:1435): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.431379 kernel: audit: type=1400 audit(1707505170.365:1436): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.453272 kernel: audit: type=1400 audit(1707505170.365:1437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.492132 kernel: audit: type=1400 audit(1707505170.365:1438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.492258 kernel: audit: type=1400 audit(1707505170.365:1439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.512289 kernel: audit: type=1400 audit(1707505170.365:1440): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.533142 kernel: audit: type=1400 audit(1707505170.365:1441): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.552352 kernel: audit: type=1400 audit(1707505170.365:1442): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.572404 kernel: audit: type=1400 audit(1707505170.365:1443): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.365000 audit: BPF prog-id=206 op=LOAD Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5403 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383635343964393434623663663839636230323039656132363935 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5403 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383635343964393434623663663839636230323039656132363935 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.391000 audit: BPF prog-id=207 op=LOAD Feb 9 18:59:30.391000 audit[5501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5403 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383635343964393434623663663839636230323039656132363935 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit: BPF prog-id=208 op=LOAD Feb 9 18:59:30.409000 audit[5501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5403 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383635343964393434623663663839636230323039656132363935 Feb 9 18:59:30.409000 audit: BPF prog-id=208 op=UNLOAD Feb 9 18:59:30.409000 audit: BPF prog-id=207 op=UNLOAD Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { perfmon } for pid=5501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit[5501]: AVC avc: denied { bpf } for pid=5501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.409000 audit: BPF prog-id=209 op=LOAD Feb 9 18:59:30.409000 audit[5501]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5403 pid=5501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663383635343964393434623663663839636230323039656132363935 Feb 9 18:59:30.580910 env[1381]: time="2024-02-09T18:59:30.580857278Z" level=info msg="StartContainer for \"fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855\" returns successfully" Feb 9 18:59:30.740234 env[1381]: time="2024-02-09T18:59:30.740115827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.760993 env[1381]: time="2024-02-09T18:59:30.760937335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.770788 env[1381]: time="2024-02-09T18:59:30.770738186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.781834 env[1381]: time="2024-02-09T18:59:30.781777364Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:59:30.782229 env[1381]: time="2024-02-09T18:59:30.782198486Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 9 18:59:30.784092 env[1381]: time="2024-02-09T18:59:30.784061216Z" level=info msg="CreateContainer within sandbox \"808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 18:59:30.864318 env[1381]: time="2024-02-09T18:59:30.864226313Z" level=info msg="CreateContainer within sandbox \"808728b0027ab15453a6942f5fba56d3c51f37b643c7c968cf5e24ee75fc827d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f\"" Feb 9 18:59:30.865103 env[1381]: time="2024-02-09T18:59:30.865077318Z" level=info msg="StartContainer for \"b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f\"" Feb 9 18:59:30.896333 systemd[1]: Started cri-containerd-b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f.scope. Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit: BPF prog-id=210 op=LOAD Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5458 pid=5539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393433333934323239373562656137323162656565373933333664 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5458 pid=5539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393433333934323239373562656137323162656565373933333664 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit: BPF prog-id=211 op=LOAD Feb 9 18:59:30.916000 audit[5539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5458 pid=5539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393433333934323239373562656137323162656565373933333664 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit: BPF prog-id=212 op=LOAD Feb 9 18:59:30.916000 audit[5539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5458 pid=5539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393433333934323239373562656137323162656565373933333664 Feb 9 18:59:30.916000 audit: BPF prog-id=212 op=UNLOAD Feb 9 18:59:30.916000 audit: BPF prog-id=211 op=UNLOAD Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { perfmon } for pid=5539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit[5539]: AVC avc: denied { bpf } for pid=5539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:59:30.916000 audit: BPF prog-id=213 op=LOAD Feb 9 18:59:30.916000 audit[5539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5458 pid=5539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:30.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239393433333934323239373562656137323162656565373933333664 Feb 9 18:59:30.982116 env[1381]: time="2024-02-09T18:59:30.982063167Z" level=info msg="StartContainer for \"b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f\" returns successfully" Feb 9 18:59:31.200939 kubelet[2547]: I0209 18:59:31.200894 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8547f6b544-dvhzm" podStartSLOduration=-9.223372030653933e+09 pod.CreationTimestamp="2024-02-09 18:59:25 +0000 UTC" firstStartedPulling="2024-02-09 18:59:26.787732182 +0000 UTC m=+75.135262037" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:31.198466727 +0000 UTC m=+79.545996542" watchObservedRunningTime="2024-02-09 18:59:31.2008423 +0000 UTC m=+79.548372155" Feb 9 18:59:31.234513 kubelet[2547]: I0209 18:59:31.234456 2547 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8547f6b544-m9s2d" podStartSLOduration=-9.223372030620363e+09 pod.CreationTimestamp="2024-02-09 18:59:25 +0000 UTC" firstStartedPulling="2024-02-09 18:59:26.725066287 +0000 UTC m=+75.072596142" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 18:59:31.233321228 +0000 UTC m=+79.580851083" watchObservedRunningTime="2024-02-09 18:59:31.234412273 +0000 UTC m=+79.581942128" Feb 9 18:59:31.362000 audit[5595]: NETFILTER_CFG table=filter:141 family=2 entries=8 op=nft_register_rule pid=5595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:31.362000 audit[5595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffd811aee0 a2=0 a3=ffffb08bc6c0 items=0 ppid=2745 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:31.362000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:31.366000 audit[5595]: NETFILTER_CFG table=nat:142 family=2 entries=78 op=nft_register_rule pid=5595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:31.366000 audit[5595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd811aee0 a2=0 a3=ffffb08bc6c0 items=0 ppid=2745 pid=5595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:31.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:31.516000 audit[5621]: NETFILTER_CFG table=filter:143 family=2 entries=8 op=nft_register_rule pid=5621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:31.516000 audit[5621]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffcd005a90 a2=0 a3=ffffb7e656c0 items=0 ppid=2745 pid=5621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:31.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:31.518000 audit[5621]: NETFILTER_CFG table=nat:144 family=2 entries=78 op=nft_register_rule pid=5621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:31.518000 audit[5621]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffcd005a90 a2=0 a3=ffffb7e656c0 items=0 ppid=2745 pid=5621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:31.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:31.687000 audit[5550]: AVC avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 18:59:31.687000 audit[5550]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40009ebfa0 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 18:59:31.687000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:59:32.165000 audit[5512]: AVC avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 18:59:32.165000 audit[5512]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000da6ae0 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 18:59:32.165000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 18:59:46.935646 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.vrChAA.mount: Deactivated successfully. Feb 9 18:59:56.414000 audit[5765]: NETFILTER_CFG table=filter:145 family=2 entries=7 op=nft_register_rule pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.420682 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 18:59:56.420822 kernel: audit: type=1325 audit(1707505196.414:1476): table=filter:145 family=2 entries=7 op=nft_register_rule pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.414000 audit[5765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff458f700 a2=0 a3=ffff9a97c6c0 items=0 ppid=2745 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.467423 kernel: audit: type=1300 audit(1707505196.414:1476): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff458f700 a2=0 a3=ffff9a97c6c0 items=0 ppid=2745 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.482463 kernel: audit: type=1327 audit(1707505196.414:1476): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.416000 audit[5765]: NETFILTER_CFG table=nat:146 family=2 entries=85 op=nft_register_chain pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.497154 kernel: audit: type=1325 audit(1707505196.416:1477): table=nat:146 family=2 entries=85 op=nft_register_chain pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.416000 audit[5765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=fffff458f700 a2=0 a3=ffff9a97c6c0 items=0 ppid=2745 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.527566 kernel: audit: type=1300 audit(1707505196.416:1477): arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=fffff458f700 a2=0 a3=ffff9a97c6c0 items=0 ppid=2745 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.543780 kernel: audit: type=1327 audit(1707505196.416:1477): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.591000 audit[5791]: NETFILTER_CFG table=filter:147 family=2 entries=6 op=nft_register_rule pid=5791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.591000 audit[5791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc36ac3c0 a2=0 a3=ffff965da6c0 items=0 ppid=2745 pid=5791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.637689 kernel: audit: type=1325 audit(1707505196.591:1478): table=filter:147 family=2 entries=6 op=nft_register_rule pid=5791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.637837 kernel: audit: type=1300 audit(1707505196.591:1478): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc36ac3c0 a2=0 a3=ffff965da6c0 items=0 ppid=2745 pid=5791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.591000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.652566 kernel: audit: type=1327 audit(1707505196.591:1478): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:59:56.593000 audit[5791]: NETFILTER_CFG table=nat:148 family=2 entries=92 op=nft_register_chain pid=5791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.668098 kernel: audit: type=1325 audit(1707505196.593:1479): table=nat:148 family=2 entries=92 op=nft_register_chain pid=5791 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:59:56.593000 audit[5791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffc36ac3c0 a2=0 a3=ffff965da6c0 items=0 ppid=2745 pid=5791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:56.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:00:07.514000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:07.520027 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:00:07.520233 kernel: audit: type=1400 audit(1707505207.514:1480): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:07.514000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:07.569553 kernel: audit: type=1400 audit(1707505207.514:1481): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:07.514000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400284d4d0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:07.601334 kernel: audit: type=1300 audit(1707505207.514:1480): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400284d4d0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:07.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:07.627373 kernel: audit: type=1327 audit(1707505207.514:1480): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:07.514000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400244f3a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:07.659118 kernel: audit: type=1300 audit(1707505207.514:1481): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=400244f3a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:07.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:07.685958 kernel: audit: type=1327 audit(1707505207.514:1481): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:08.243000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.243000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4013a2a660 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.298628 kernel: audit: type=1400 audit(1707505208.243:1482): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.298785 kernel: audit: type=1300 audit(1707505208.243:1482): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4013a2a660 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.243000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.324498 kernel: audit: type=1327 audit(1707505208.243:1482): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.249000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.365801 kernel: audit: type=1400 audit(1707505208.249:1483): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.249000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40138ca4b0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.252000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.252000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40018a17c0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.294000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.294000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4013a2a810 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.294000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.294000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4002a7a320 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:08.294000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:08.294000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40138ca660 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:00:08.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:00:20.075099 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.pFxQYQ.mount: Deactivated successfully. Feb 9 19:00:23.648000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.654055 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 9 19:00:23.654187 kernel: audit: type=1400 audit(1707505223.648:1488): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.648000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027ea040 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.707082 kernel: audit: type=1300 audit(1707505223.648:1488): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40027ea040 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.707233 kernel: audit: type=1327 audit(1707505223.648:1488): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.651000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.753876 kernel: audit: type=1400 audit(1707505223.651:1489): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.753997 kernel: audit: type=1300 audit(1707505223.651:1489): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400280e760 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.651000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400280e760 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.810315 kernel: audit: type=1327 audit(1707505223.651:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.810447 kernel: audit: type=1400 audit(1707505223.651:1490): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.651000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.651000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400280e780 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.862827 kernel: audit: type=1300 audit(1707505223.651:1490): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400280e780 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.651000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.888417 kernel: audit: type=1327 audit(1707505223.651:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:23.888599 kernel: audit: type=1400 audit(1707505223.653:1491): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.653000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:00:23.653000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400280e9a0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:00:23.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:00:26.308846 systemd[1]: run-containerd-runc-k8s.io-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855-runc.Bembw2.mount: Deactivated successfully. Feb 9 19:00:27.302396 systemd[1]: run-containerd-runc-k8s.io-b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f-runc.5tR9Eh.mount: Deactivated successfully. Feb 9 19:00:31.687000 audit[5550]: AVC avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 19:00:31.694165 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:00:31.694318 kernel: audit: type=1400 audit(1707505231.687:1492): avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 19:00:31.687000 audit[5550]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000590cc0 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 19:00:31.747475 kernel: audit: type=1300 audit(1707505231.687:1492): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000590cc0 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 19:00:31.687000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:00:31.772693 kernel: audit: type=1327 audit(1707505231.687:1492): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:00:32.167000 audit[5512]: AVC avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 19:00:32.167000 audit[5512]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a167e0 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 19:00:32.220803 kernel: audit: type=1400 audit(1707505232.167:1493): avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 19:00:32.220942 kernel: audit: type=1300 audit(1707505232.167:1493): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a167e0 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 19:00:32.167000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:00:32.245518 kernel: audit: type=1327 audit(1707505232.167:1493): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:00:35.563510 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.7WzTiF.mount: Deactivated successfully. Feb 9 19:00:50.082355 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.NZI7qH.mount: Deactivated successfully. Feb 9 19:00:50.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.14:22-10.200.12.6:39026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.508077 systemd[1]: Started sshd@7-10.200.20.14:22-10.200.12.6:39026.service. Feb 9 19:00:50.533311 kernel: audit: type=1130 audit(1707505250.506:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.14:22-10.200.12.6:39026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.951000 audit[5969]: USER_ACCT pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.953355 sshd[5969]: Accepted publickey for core from 10.200.12.6 port 39026 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:50.975000 audit[5969]: CRED_ACQ pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.999162 kernel: audit: type=1101 audit(1707505250.951:1495): pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.999322 kernel: audit: type=1103 audit(1707505250.975:1496): pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.999682 sshd[5969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:51.013331 kernel: audit: type=1006 audit(1707505250.975:1497): pid=5969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:00:51.013466 kernel: audit: type=1300 audit(1707505250.975:1497): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf685770 a2=3 a3=1 items=0 ppid=1 pid=5969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:50.975000 audit[5969]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf685770 a2=3 a3=1 items=0 ppid=1 pid=5969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:51.018038 systemd[1]: Started session-10.scope. Feb 9 19:00:51.019390 systemd-logind[1370]: New session 10 of user core. Feb 9 19:00:50.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:00:51.047720 kernel: audit: type=1327 audit(1707505250.975:1497): proctitle=737368643A20636F7265205B707269765D Feb 9 19:00:51.050425 kernel: audit: type=1105 audit(1707505251.047:1498): pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.047000 audit[5969]: USER_START pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.047000 audit[5971]: CRED_ACQ pid=5971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.095624 kernel: audit: type=1103 audit(1707505251.047:1499): pid=5971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.478027 sshd[5969]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:51.477000 audit[5969]: USER_END pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.481089 systemd-logind[1370]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:00:51.482290 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:00:51.483580 systemd-logind[1370]: Removed session 10. Feb 9 19:00:51.484178 systemd[1]: sshd@7-10.200.20.14:22-10.200.12.6:39026.service: Deactivated successfully. Feb 9 19:00:51.478000 audit[5969]: CRED_DISP pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.528319 kernel: audit: type=1106 audit(1707505251.477:1500): pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.528532 kernel: audit: type=1104 audit(1707505251.478:1501): pid=5969 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:51.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.14:22-10.200.12.6:39026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:56.304195 systemd[1]: run-containerd-runc-k8s.io-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855-runc.x6r8ma.mount: Deactivated successfully. Feb 9 19:00:56.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.14:22-10.200.12.6:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:56.552884 systemd[1]: Started sshd@8-10.200.20.14:22-10.200.12.6:39028.service. Feb 9 19:00:56.557968 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:00:56.558109 kernel: audit: type=1130 audit(1707505256.552:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.14:22-10.200.12.6:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:57.030805 sshd[6023]: Accepted publickey for core from 10.200.12.6 port 39028 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:57.029000 audit[6023]: USER_ACCT pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.053000 audit[6023]: CRED_ACQ pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.055564 sshd[6023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:57.078567 kernel: audit: type=1101 audit(1707505257.029:1504): pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.078709 kernel: audit: type=1103 audit(1707505257.053:1505): pid=6023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.095006 kernel: audit: type=1006 audit(1707505257.053:1506): pid=6023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:00:57.053000 audit[6023]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc49d3190 a2=3 a3=1 items=0 ppid=1 pid=6023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:57.120087 kernel: audit: type=1300 audit(1707505257.053:1506): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc49d3190 a2=3 a3=1 items=0 ppid=1 pid=6023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:57.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:00:57.125016 systemd-logind[1370]: New session 11 of user core. Feb 9 19:00:57.125611 systemd[1]: Started session-11.scope. Feb 9 19:00:57.129024 kernel: audit: type=1327 audit(1707505257.053:1506): proctitle=737368643A20636F7265205B707269765D Feb 9 19:00:57.130000 audit[6023]: USER_START pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.130000 audit[6025]: CRED_ACQ pid=6025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.180414 kernel: audit: type=1105 audit(1707505257.130:1507): pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.180547 kernel: audit: type=1103 audit(1707505257.130:1508): pid=6025 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.298000 systemd[1]: run-containerd-runc-k8s.io-b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f-runc.nH2Whh.mount: Deactivated successfully. Feb 9 19:00:57.451352 sshd[6023]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:57.451000 audit[6023]: USER_END pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.456905 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:00:57.457795 systemd[1]: sshd@8-10.200.20.14:22-10.200.12.6:39028.service: Deactivated successfully. Feb 9 19:00:57.454000 audit[6023]: CRED_DISP pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.480628 systemd-logind[1370]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:00:57.502131 kernel: audit: type=1106 audit(1707505257.451:1509): pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.502303 kernel: audit: type=1104 audit(1707505257.454:1510): pid=6023 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:57.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.14:22-10.200.12.6:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:57.503065 systemd-logind[1370]: Removed session 11. Feb 9 19:01:02.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.14:22-10.200.12.6:59002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:02.555517 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:01:02.555589 kernel: audit: type=1130 audit(1707505262.525:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.14:22-10.200.12.6:59002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:02.526607 systemd[1]: Started sshd@9-10.200.20.14:22-10.200.12.6:59002.service. Feb 9 19:01:02.940000 audit[6035]: USER_ACCT pid=6035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:02.942541 sshd[6035]: Accepted publickey for core from 10.200.12.6 port 59002 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:02.944578 sshd[6035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:02.942000 audit[6035]: CRED_ACQ pid=6035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:02.989280 kernel: audit: type=1101 audit(1707505262.940:1513): pid=6035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:02.989429 kernel: audit: type=1103 audit(1707505262.942:1514): pid=6035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.004082 kernel: audit: type=1006 audit(1707505262.943:1515): pid=6035 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:01:02.943000 audit[6035]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfdcc4a0 a2=3 a3=1 items=0 ppid=1 pid=6035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:03.031154 kernel: audit: type=1300 audit(1707505262.943:1515): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfdcc4a0 a2=3 a3=1 items=0 ppid=1 pid=6035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:02.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:03.039562 kernel: audit: type=1327 audit(1707505262.943:1515): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:03.042080 systemd-logind[1370]: New session 12 of user core. Feb 9 19:01:03.043075 systemd[1]: Started session-12.scope. Feb 9 19:01:03.046000 audit[6035]: USER_START pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.048000 audit[6037]: CRED_ACQ pid=6037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.096668 kernel: audit: type=1105 audit(1707505263.046:1516): pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.096801 kernel: audit: type=1103 audit(1707505263.048:1517): pid=6037 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.360869 sshd[6035]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:03.360000 audit[6035]: USER_END pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.364811 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:01:03.365650 systemd[1]: sshd@9-10.200.20.14:22-10.200.12.6:59002.service: Deactivated successfully. Feb 9 19:01:03.389736 systemd-logind[1370]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:01:03.390663 systemd-logind[1370]: Removed session 12. Feb 9 19:01:03.362000 audit[6035]: CRED_DISP pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.416198 kernel: audit: type=1106 audit(1707505263.360:1518): pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.416346 kernel: audit: type=1104 audit(1707505263.362:1519): pid=6035 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:03.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.14:22-10.200.12.6:59002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:07.514000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:07.514000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fe0fa0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:07.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:07.514000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:07.514000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001df49c0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:07.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:08.244000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.250236 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:01:08.250388 kernel: audit: type=1400 audit(1707505268.244:1523): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.244000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=40136d7890 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.303653 kernel: audit: type=1300 audit(1707505268.244:1523): arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=40136d7890 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.330022 kernel: audit: type=1327 audit(1707505268.244:1523): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.330277 kernel: audit: type=1400 audit(1707505268.250:1524): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.250000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.250000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=401319dbc0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.385926 kernel: audit: type=1300 audit(1707505268.250:1524): arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=401319dbc0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.250000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.412084 kernel: audit: type=1327 audit(1707505268.250:1524): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.253000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.433711 systemd[1]: Started sshd@10-10.200.20.14:22-10.200.12.6:33776.service. Feb 9 19:01:08.435321 kernel: audit: type=1400 audit(1707505268.253:1525): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.435403 kernel: audit: type=1300 audit(1707505268.253:1525): arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4002736500 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.253000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4002736500 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.489822 kernel: audit: type=1327 audit(1707505268.253:1525): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.294000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.516971 kernel: audit: type=1400 audit(1707505268.294:1526): avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.294000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=4002736e20 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.295000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.295000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=40136d7ad0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.295000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:08.295000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=401319dd40 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:01:08.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:01:08.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.14:22-10.200.12.6:33776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:08.861000 audit[6048]: USER_ACCT pid=6048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:08.863369 sshd[6048]: Accepted publickey for core from 10.200.12.6 port 33776 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:08.863000 audit[6048]: CRED_ACQ pid=6048 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:08.863000 audit[6048]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5c8d450 a2=3 a3=1 items=0 ppid=1 pid=6048 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:08.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:08.865053 sshd[6048]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:08.869532 systemd[1]: Started session-13.scope. Feb 9 19:01:08.869883 systemd-logind[1370]: New session 13 of user core. Feb 9 19:01:08.872000 audit[6048]: USER_START pid=6048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:08.874000 audit[6050]: CRED_ACQ pid=6050 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.231540 sshd[6048]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:09.231000 audit[6048]: USER_END pid=6048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.231000 audit[6048]: CRED_DISP pid=6048 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.234966 systemd[1]: sshd@10-10.200.20.14:22-10.200.12.6:33776.service: Deactivated successfully. Feb 9 19:01:09.235772 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:01:09.236291 systemd-logind[1370]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:01:09.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.14:22-10.200.12.6:33776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.237037 systemd-logind[1370]: Removed session 13. Feb 9 19:01:09.301549 systemd[1]: Started sshd@11-10.200.20.14:22-10.200.12.6:33790.service. Feb 9 19:01:09.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.14:22-10.200.12.6:33790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:09.715000 audit[6060]: USER_ACCT pid=6060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.717153 sshd[6060]: Accepted publickey for core from 10.200.12.6 port 33790 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:09.717000 audit[6060]: CRED_ACQ pid=6060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.717000 audit[6060]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5efbb50 a2=3 a3=1 items=0 ppid=1 pid=6060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:09.717000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:09.721378 sshd[6060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:09.725881 systemd[1]: Started session-14.scope. Feb 9 19:01:09.726405 systemd-logind[1370]: New session 14 of user core. Feb 9 19:01:09.728000 audit[6060]: USER_START pid=6060 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:09.730000 audit[6062]: CRED_ACQ pid=6062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.251589 sshd[6060]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:11.251000 audit[6060]: USER_END pid=6060 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.251000 audit[6060]: CRED_DISP pid=6060 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.254589 systemd[1]: sshd@11-10.200.20.14:22-10.200.12.6:33790.service: Deactivated successfully. Feb 9 19:01:11.255445 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:01:11.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.14:22-10.200.12.6:33790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:11.256321 systemd-logind[1370]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:01:11.257783 systemd-logind[1370]: Removed session 14. Feb 9 19:01:11.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.14:22-10.200.12.6:33806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:11.321625 systemd[1]: Started sshd@12-10.200.20.14:22-10.200.12.6:33806.service. Feb 9 19:01:11.743000 audit[6070]: USER_ACCT pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.744812 sshd[6070]: Accepted publickey for core from 10.200.12.6 port 33806 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:11.744000 audit[6070]: CRED_ACQ pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.744000 audit[6070]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff62f34f0 a2=3 a3=1 items=0 ppid=1 pid=6070 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:11.744000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:11.746500 sshd[6070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:11.751579 systemd[1]: Started session-15.scope. Feb 9 19:01:11.752210 systemd-logind[1370]: New session 15 of user core. Feb 9 19:01:11.755000 audit[6070]: USER_START pid=6070 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:11.756000 audit[6072]: CRED_ACQ pid=6072 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:12.121015 sshd[6070]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:12.121000 audit[6070]: USER_END pid=6070 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:12.121000 audit[6070]: CRED_DISP pid=6070 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:12.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.14:22-10.200.12.6:33806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:12.125551 systemd[1]: sshd@12-10.200.20.14:22-10.200.12.6:33806.service: Deactivated successfully. Feb 9 19:01:12.126382 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:01:12.127219 systemd-logind[1370]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:01:12.127994 systemd-logind[1370]: Removed session 15. Feb 9 19:01:16.936125 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.qMTm7A.mount: Deactivated successfully. Feb 9 19:01:17.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.14:22-10.200.12.6:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:17.197691 systemd[1]: Started sshd@13-10.200.20.14:22-10.200.12.6:51018.service. Feb 9 19:01:17.203692 kernel: kauditd_printk_skb: 41 callbacks suppressed Feb 9 19:01:17.203826 kernel: audit: type=1130 audit(1707505277.197:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.14:22-10.200.12.6:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:17.618000 audit[6104]: USER_ACCT pid=6104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.619441 sshd[6104]: Accepted publickey for core from 10.200.12.6 port 51018 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:17.645442 kernel: audit: type=1101 audit(1707505277.618:1557): pid=6104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.644886 sshd[6104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:17.650759 systemd[1]: Started session-16.scope. Feb 9 19:01:17.652211 systemd-logind[1370]: New session 16 of user core. Feb 9 19:01:17.644000 audit[6104]: CRED_ACQ pid=6104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.692178 kernel: audit: type=1103 audit(1707505277.644:1558): pid=6104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.692388 kernel: audit: type=1006 audit(1707505277.644:1559): pid=6104 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:01:17.644000 audit[6104]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2ac29e0 a2=3 a3=1 items=0 ppid=1 pid=6104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.717935 kernel: audit: type=1300 audit(1707505277.644:1559): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2ac29e0 a2=3 a3=1 items=0 ppid=1 pid=6104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:17.726241 kernel: audit: type=1327 audit(1707505277.644:1559): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:17.692000 audit[6104]: USER_START pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.753963 kernel: audit: type=1105 audit(1707505277.692:1560): pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.694000 audit[6106]: CRED_ACQ pid=6106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:17.775744 kernel: audit: type=1103 audit(1707505277.694:1561): pid=6106 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:18.021585 sshd[6104]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:18.022000 audit[6104]: USER_END pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:18.024902 systemd-logind[1370]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:01:18.026220 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:01:18.027567 systemd-logind[1370]: Removed session 16. Feb 9 19:01:18.028267 systemd[1]: sshd@13-10.200.20.14:22-10.200.12.6:51018.service: Deactivated successfully. Feb 9 19:01:18.022000 audit[6104]: CRED_DISP pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:18.072792 kernel: audit: type=1106 audit(1707505278.022:1562): pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:18.072957 kernel: audit: type=1104 audit(1707505278.022:1563): pid=6104 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:18.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.14:22-10.200.12.6:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:20.075119 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.9imLdy.mount: Deactivated successfully. Feb 9 19:01:23.100718 systemd[1]: Started sshd@14-10.200.20.14:22-10.200.12.6:51030.service. Feb 9 19:01:23.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.14:22-10.200.12.6:51030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.107391 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:01:23.107508 kernel: audit: type=1130 audit(1707505283.099:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.14:22-10.200.12.6:51030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.550000 audit[6143]: USER_ACCT pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.551582 sshd[6143]: Accepted publickey for core from 10.200.12.6 port 51030 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:23.553475 sshd[6143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:23.558905 systemd[1]: Started session-17.scope. Feb 9 19:01:23.560393 systemd-logind[1370]: New session 17 of user core. Feb 9 19:01:23.551000 audit[6143]: CRED_ACQ pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.598219 kernel: audit: type=1101 audit(1707505283.550:1566): pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.598369 kernel: audit: type=1103 audit(1707505283.551:1567): pid=6143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.613326 kernel: audit: type=1006 audit(1707505283.551:1568): pid=6143 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 9 19:01:23.551000 audit[6143]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f12060 a2=3 a3=1 items=0 ppid=1 pid=6143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.637304 kernel: audit: type=1300 audit(1707505283.551:1568): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9f12060 a2=3 a3=1 items=0 ppid=1 pid=6143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:23.645699 kernel: audit: type=1327 audit(1707505283.551:1568): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:23.577000 audit[6143]: USER_START pid=6143 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.670925 kernel: audit: type=1105 audit(1707505283.577:1569): pid=6143 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.579000 audit[6145]: CRED_ACQ pid=6145 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.693983 kernel: audit: type=1103 audit(1707505283.579:1570): pid=6145 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.649000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:23.716242 kernel: audit: type=1400 audit(1707505283.649:1571): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:23.649000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002509460 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:23.746324 kernel: audit: type=1300 audit(1707505283.649:1571): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002509460 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:23.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:23.669000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:23.669000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40027770e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:23.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:23.669000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:23.669000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002777100 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:23.669000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:23.670000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:01:23.670000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40025094e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:01:23.670000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:01:23.961406 sshd[6143]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:23.961000 audit[6143]: USER_END pid=6143 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.961000 audit[6143]: CRED_DISP pid=6143 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:23.964365 systemd-logind[1370]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:01:23.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.14:22-10.200.12.6:51030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:23.965467 systemd[1]: sshd@14-10.200.20.14:22-10.200.12.6:51030.service: Deactivated successfully. Feb 9 19:01:23.966227 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:01:23.967594 systemd-logind[1370]: Removed session 17. Feb 9 19:01:26.312902 systemd[1]: run-containerd-runc-k8s.io-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855-runc.o3Mj93.mount: Deactivated successfully. Feb 9 19:01:26.329201 systemd[1]: run-containerd-runc-k8s.io-b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f-runc.S9I9pq.mount: Deactivated successfully. Feb 9 19:01:29.036949 systemd[1]: Started sshd@15-10.200.20.14:22-10.200.12.6:51990.service. Feb 9 19:01:29.073932 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:01:29.074009 kernel: audit: type=1130 audit(1707505289.035:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.14:22-10.200.12.6:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:29.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.14:22-10.200.12.6:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:29.482000 audit[6196]: USER_ACCT pid=6196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.483903 sshd[6196]: Accepted publickey for core from 10.200.12.6 port 51990 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:29.486344 sshd[6196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:29.484000 audit[6196]: CRED_ACQ pid=6196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.531794 kernel: audit: type=1101 audit(1707505289.482:1579): pid=6196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.531915 kernel: audit: type=1103 audit(1707505289.484:1580): pid=6196 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.546513 kernel: audit: type=1006 audit(1707505289.484:1581): pid=6196 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 9 19:01:29.484000 audit[6196]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5160ba0 a2=3 a3=1 items=0 ppid=1 pid=6196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:29.571344 kernel: audit: type=1300 audit(1707505289.484:1581): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5160ba0 a2=3 a3=1 items=0 ppid=1 pid=6196 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:29.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:29.583472 kernel: audit: type=1327 audit(1707505289.484:1581): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:29.583786 systemd-logind[1370]: New session 18 of user core. Feb 9 19:01:29.584710 systemd[1]: Started session-18.scope. Feb 9 19:01:29.588000 audit[6196]: USER_START pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.617000 audit[6198]: CRED_ACQ pid=6198 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.644576 kernel: audit: type=1105 audit(1707505289.588:1582): pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.644732 kernel: audit: type=1103 audit(1707505289.617:1583): pid=6198 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.933525 sshd[6196]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:29.933000 audit[6196]: USER_END pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.937125 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:01:29.937962 systemd[1]: sshd@15-10.200.20.14:22-10.200.12.6:51990.service: Deactivated successfully. Feb 9 19:01:29.934000 audit[6196]: CRED_DISP pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.961364 systemd-logind[1370]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:01:29.982704 kernel: audit: type=1106 audit(1707505289.933:1584): pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.982814 kernel: audit: type=1104 audit(1707505289.934:1585): pid=6196 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:29.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.14:22-10.200.12.6:51990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:29.983778 systemd-logind[1370]: Removed session 18. Feb 9 19:01:30.009681 systemd[1]: Started sshd@16-10.200.20.14:22-10.200.12.6:51992.service. Feb 9 19:01:30.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.14:22-10.200.12.6:51992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:30.454000 audit[6208]: USER_ACCT pid=6208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:30.456113 sshd[6208]: Accepted publickey for core from 10.200.12.6 port 51992 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:30.455000 audit[6208]: CRED_ACQ pid=6208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:30.455000 audit[6208]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf522320 a2=3 a3=1 items=0 ppid=1 pid=6208 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:30.457420 sshd[6208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:30.462467 systemd[1]: Started session-19.scope. Feb 9 19:01:30.462941 systemd-logind[1370]: New session 19 of user core. Feb 9 19:01:30.468000 audit[6208]: USER_START pid=6208 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:30.470000 audit[6213]: CRED_ACQ pid=6213 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:30.998026 sshd[6208]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:30.997000 audit[6208]: USER_END pid=6208 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:30.997000 audit[6208]: CRED_DISP pid=6208 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:31.001013 systemd-logind[1370]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:01:31.001157 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:01:31.002024 systemd[1]: sshd@16-10.200.20.14:22-10.200.12.6:51992.service: Deactivated successfully. Feb 9 19:01:31.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.14:22-10.200.12.6:51992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:31.003415 systemd-logind[1370]: Removed session 19. Feb 9 19:01:31.077071 systemd[1]: Started sshd@17-10.200.20.14:22-10.200.12.6:52006.service. Feb 9 19:01:31.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.14:22-10.200.12.6:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:31.524000 audit[6221]: USER_ACCT pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:31.525579 sshd[6221]: Accepted publickey for core from 10.200.12.6 port 52006 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:31.525000 audit[6221]: CRED_ACQ pid=6221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:31.525000 audit[6221]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4834ba0 a2=3 a3=1 items=0 ppid=1 pid=6221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:31.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:31.527211 sshd[6221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:31.531983 systemd[1]: Started session-20.scope. Feb 9 19:01:31.532299 systemd-logind[1370]: New session 20 of user core. Feb 9 19:01:31.535000 audit[6221]: USER_START pid=6221 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:31.536000 audit[6223]: CRED_ACQ pid=6223 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:31.688000 audit[5550]: AVC avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 19:01:31.688000 audit[5550]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001d5a780 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 19:01:31.688000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:01:32.167000 audit[5512]: AVC avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 19:01:32.167000 audit[5512]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40013fcfe0 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 19:01:32.167000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:01:32.818000 audit[6259]: NETFILTER_CFG table=filter:149 family=2 entries=18 op=nft_register_rule pid=6259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.818000 audit[6259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=fffff2f89e00 a2=0 a3=ffff820d06c0 items=0 ppid=2745 pid=6259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.821000 audit[6259]: NETFILTER_CFG table=nat:150 family=2 entries=94 op=nft_register_rule pid=6259 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.821000 audit[6259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=fffff2f89e00 a2=0 a3=ffff820d06c0 items=0 ppid=2745 pid=6259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.852574 sshd[6221]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:32.852000 audit[6221]: USER_END pid=6221 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:32.852000 audit[6221]: CRED_DISP pid=6221 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:32.855951 systemd[1]: sshd@17-10.200.20.14:22-10.200.12.6:52006.service: Deactivated successfully. Feb 9 19:01:32.856854 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:01:32.857211 systemd-logind[1370]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:01:32.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.14:22-10.200.12.6:52006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:32.858765 systemd-logind[1370]: Removed session 20. Feb 9 19:01:32.885000 audit[6286]: NETFILTER_CFG table=filter:151 family=2 entries=30 op=nft_register_rule pid=6286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.885000 audit[6286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffe34b03f0 a2=0 a3=ffff82fdf6c0 items=0 ppid=2745 pid=6286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.886000 audit[6286]: NETFILTER_CFG table=nat:152 family=2 entries=94 op=nft_register_rule pid=6286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.886000 audit[6286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffe34b03f0 a2=0 a3=ffff82fdf6c0 items=0 ppid=2745 pid=6286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.14:22-10.200.12.6:52018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:32.935001 systemd[1]: Started sshd@18-10.200.20.14:22-10.200.12.6:52018.service. Feb 9 19:01:33.356000 audit[6288]: USER_ACCT pid=6288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.358122 sshd[6288]: Accepted publickey for core from 10.200.12.6 port 52018 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:33.358000 audit[6288]: CRED_ACQ pid=6288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.358000 audit[6288]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffa3a980 a2=3 a3=1 items=0 ppid=1 pid=6288 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.358000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:33.359715 sshd[6288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:33.363966 systemd-logind[1370]: New session 21 of user core. Feb 9 19:01:33.364504 systemd[1]: Started session-21.scope. Feb 9 19:01:33.367000 audit[6288]: USER_START pid=6288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.368000 audit[6290]: CRED_ACQ pid=6290 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.901298 sshd[6288]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:33.900000 audit[6288]: USER_END pid=6288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.901000 audit[6288]: CRED_DISP pid=6288 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:33.903792 systemd[1]: sshd@18-10.200.20.14:22-10.200.12.6:52018.service: Deactivated successfully. Feb 9 19:01:33.904611 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:01:33.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.14:22-10.200.12.6:52018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:33.905544 systemd-logind[1370]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:01:33.906497 systemd-logind[1370]: Removed session 21. Feb 9 19:01:33.983936 systemd[1]: Started sshd@19-10.200.20.14:22-10.200.12.6:52032.service. Feb 9 19:01:33.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.14:22-10.200.12.6:52032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:34.438000 audit[6299]: USER_ACCT pid=6299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.439644 sshd[6299]: Accepted publickey for core from 10.200.12.6 port 52032 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:34.441548 sshd[6299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:34.444572 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 19:01:34.444683 kernel: audit: type=1101 audit(1707505294.438:1621): pid=6299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.439000 audit[6299]: CRED_ACQ pid=6299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.492708 kernel: audit: type=1103 audit(1707505294.439:1622): pid=6299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.507689 kernel: audit: type=1006 audit(1707505294.439:1623): pid=6299 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:01:34.509028 kernel: audit: type=1300 audit(1707505294.439:1623): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe07fea20 a2=3 a3=1 items=0 ppid=1 pid=6299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:34.439000 audit[6299]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe07fea20 a2=3 a3=1 items=0 ppid=1 pid=6299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:34.439000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:34.541790 kernel: audit: type=1327 audit(1707505294.439:1623): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:34.544197 systemd[1]: Started session-22.scope. Feb 9 19:01:34.544533 systemd-logind[1370]: New session 22 of user core. Feb 9 19:01:34.547000 audit[6299]: USER_START pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.549000 audit[6301]: CRED_ACQ pid=6301 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.599762 kernel: audit: type=1105 audit(1707505294.547:1624): pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.599887 kernel: audit: type=1103 audit(1707505294.549:1625): pid=6301 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.868754 sshd[6299]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:34.869000 audit[6299]: USER_END pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.872279 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:01:34.873044 systemd[1]: sshd@19-10.200.20.14:22-10.200.12.6:52032.service: Deactivated successfully. Feb 9 19:01:34.869000 audit[6299]: CRED_DISP pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.920169 kernel: audit: type=1106 audit(1707505294.869:1626): pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.920903 kernel: audit: type=1104 audit(1707505294.869:1627): pid=6299 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:34.920959 kernel: audit: type=1131 audit(1707505294.872:1628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.14:22-10.200.12.6:52032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:34.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.14:22-10.200.12.6:52032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:34.943329 systemd-logind[1370]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:01:34.944440 systemd-logind[1370]: Removed session 22. Feb 9 19:01:35.563449 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.0R5h6I.mount: Deactivated successfully. Feb 9 19:01:39.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.14:22-10.200.12.6:33666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:39.944759 systemd[1]: Started sshd@20-10.200.20.14:22-10.200.12.6:33666.service. Feb 9 19:01:39.968284 kernel: audit: type=1130 audit(1707505299.943:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.14:22-10.200.12.6:33666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:40.392000 audit[6338]: USER_ACCT pid=6338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.395486 sshd[6338]: Accepted publickey for core from 10.200.12.6 port 33666 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:40.398860 sshd[6338]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:40.397000 audit[6338]: CRED_ACQ pid=6338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.440837 kernel: audit: type=1101 audit(1707505300.392:1630): pid=6338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.441021 kernel: audit: type=1103 audit(1707505300.397:1631): pid=6338 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.455093 kernel: audit: type=1006 audit(1707505300.397:1632): pid=6338 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 9 19:01:40.397000 audit[6338]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe62f84e0 a2=3 a3=1 items=0 ppid=1 pid=6338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.479620 kernel: audit: type=1300 audit(1707505300.397:1632): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe62f84e0 a2=3 a3=1 items=0 ppid=1 pid=6338 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:40.487914 kernel: audit: type=1327 audit(1707505300.397:1632): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:40.490800 systemd-logind[1370]: New session 23 of user core. Feb 9 19:01:40.491328 systemd[1]: Started session-23.scope. Feb 9 19:01:40.494000 audit[6338]: USER_START pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.520000 audit[6340]: CRED_ACQ pid=6340 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.543088 kernel: audit: type=1105 audit(1707505300.494:1633): pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.543237 kernel: audit: type=1103 audit(1707505300.520:1634): pid=6340 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.836463 sshd[6338]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:40.836000 audit[6338]: USER_END pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.839307 systemd-logind[1370]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:01:40.840427 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:01:40.841701 systemd-logind[1370]: Removed session 23. Feb 9 19:01:40.842406 systemd[1]: sshd@20-10.200.20.14:22-10.200.12.6:33666.service: Deactivated successfully. Feb 9 19:01:40.836000 audit[6338]: CRED_DISP pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.886144 kernel: audit: type=1106 audit(1707505300.836:1635): pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.888918 kernel: audit: type=1104 audit(1707505300.836:1636): pid=6338 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:40.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.14:22-10.200.12.6:33666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:41.047000 audit[6374]: NETFILTER_CFG table=filter:153 family=2 entries=18 op=nft_register_rule pid=6374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:41.047000 audit[6374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd23b4120 a2=0 a3=ffffad3ee6c0 items=0 ppid=2745 pid=6374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:41.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:41.051000 audit[6374]: NETFILTER_CFG table=nat:154 family=2 entries=178 op=nft_register_chain pid=6374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:41.051000 audit[6374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffd23b4120 a2=0 a3=ffffad3ee6c0 items=0 ppid=2745 pid=6374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:41.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:45.927449 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 19:01:45.927599 kernel: audit: type=1130 audit(1707505305.911:1640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.14:22-10.200.12.6:33668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:45.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.14:22-10.200.12.6:33668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:45.912066 systemd[1]: Started sshd@21-10.200.20.14:22-10.200.12.6:33668.service. Feb 9 19:01:46.364000 audit[6377]: USER_ACCT pid=6377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.365140 sshd[6377]: Accepted publickey for core from 10.200.12.6 port 33668 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:46.367275 sshd[6377]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:46.366000 audit[6377]: CRED_ACQ pid=6377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.412564 kernel: audit: type=1101 audit(1707505306.364:1641): pid=6377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.412686 kernel: audit: type=1103 audit(1707505306.366:1642): pid=6377 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.426982 kernel: audit: type=1006 audit(1707505306.366:1643): pid=6377 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 9 19:01:46.366000 audit[6377]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcffad370 a2=3 a3=1 items=0 ppid=1 pid=6377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.451513 kernel: audit: type=1300 audit(1707505306.366:1643): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcffad370 a2=3 a3=1 items=0 ppid=1 pid=6377 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:46.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:46.454278 systemd[1]: Started session-24.scope. Feb 9 19:01:46.455346 systemd-logind[1370]: New session 24 of user core. Feb 9 19:01:46.459939 kernel: audit: type=1327 audit(1707505306.366:1643): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:46.460000 audit[6377]: USER_START pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.486183 kernel: audit: type=1105 audit(1707505306.460:1644): pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.486366 kernel: audit: type=1103 audit(1707505306.462:1645): pid=6380 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.462000 audit[6380]: CRED_ACQ pid=6380 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.779982 sshd[6377]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:46.780000 audit[6377]: USER_END pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.783534 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:01:46.784263 systemd[1]: sshd@21-10.200.20.14:22-10.200.12.6:33668.service: Deactivated successfully. Feb 9 19:01:46.781000 audit[6377]: CRED_DISP pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.807798 systemd-logind[1370]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:01:46.808678 systemd-logind[1370]: Removed session 24. Feb 9 19:01:46.830225 kernel: audit: type=1106 audit(1707505306.780:1646): pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.830389 kernel: audit: type=1104 audit(1707505306.781:1647): pid=6377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:46.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.14:22-10.200.12.6:33668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:46.934769 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.VlZvNL.mount: Deactivated successfully. Feb 9 19:01:50.074524 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.gGOly6.mount: Deactivated successfully. Feb 9 19:01:51.850569 systemd[1]: Started sshd@22-10.200.20.14:22-10.200.12.6:55254.service. Feb 9 19:01:51.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.14:22-10.200.12.6:55254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:51.856460 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:01:51.856567 kernel: audit: type=1130 audit(1707505311.850:1649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.14:22-10.200.12.6:55254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:52.265000 audit[6431]: USER_ACCT pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.267299 sshd[6431]: Accepted publickey for core from 10.200.12.6 port 55254 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:52.289000 audit[6431]: CRED_ACQ pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.291506 sshd[6431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:52.313427 kernel: audit: type=1101 audit(1707505312.265:1650): pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.313562 kernel: audit: type=1103 audit(1707505312.289:1651): pid=6431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.327645 kernel: audit: type=1006 audit(1707505312.289:1652): pid=6431 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 9 19:01:52.289000 audit[6431]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe82800e0 a2=3 a3=1 items=0 ppid=1 pid=6431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.351116 kernel: audit: type=1300 audit(1707505312.289:1652): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe82800e0 a2=3 a3=1 items=0 ppid=1 pid=6431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:52.289000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:52.360646 kernel: audit: type=1327 audit(1707505312.289:1652): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:52.362906 systemd-logind[1370]: New session 25 of user core. Feb 9 19:01:52.363470 systemd[1]: Started session-25.scope. Feb 9 19:01:52.366000 audit[6431]: USER_START pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.368000 audit[6433]: CRED_ACQ pid=6433 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.414076 kernel: audit: type=1105 audit(1707505312.366:1653): pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.414159 kernel: audit: type=1103 audit(1707505312.368:1654): pid=6433 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.669469 sshd[6431]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:52.669000 audit[6431]: USER_END pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.672596 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:01:52.673314 systemd[1]: sshd@22-10.200.20.14:22-10.200.12.6:55254.service: Deactivated successfully. Feb 9 19:01:52.669000 audit[6431]: CRED_DISP pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.719506 kernel: audit: type=1106 audit(1707505312.669:1655): pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.719633 kernel: audit: type=1104 audit(1707505312.669:1656): pid=6431 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:52.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.14:22-10.200.12.6:55254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:52.719925 systemd-logind[1370]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:01:52.720701 systemd-logind[1370]: Removed session 25. Feb 9 19:01:57.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.14:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:57.758140 systemd[1]: Started sshd@23-10.200.20.14:22-10.200.12.6:46674.service. Feb 9 19:01:57.763218 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:01:57.763310 kernel: audit: type=1130 audit(1707505317.757:1658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.14:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:58.177000 audit[6484]: USER_ACCT pid=6484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.179370 sshd[6484]: Accepted publickey for core from 10.200.12.6 port 46674 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:01:58.203293 kernel: audit: type=1101 audit(1707505318.177:1659): pid=6484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.203000 audit[6484]: CRED_ACQ pid=6484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.205203 sshd[6484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:01:58.242912 kernel: audit: type=1103 audit(1707505318.203:1660): pid=6484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.243031 kernel: audit: type=1006 audit(1707505318.203:1661): pid=6484 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 9 19:01:58.203000 audit[6484]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6f2d530 a2=3 a3=1 items=0 ppid=1 pid=6484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:58.268207 kernel: audit: type=1300 audit(1707505318.203:1661): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6f2d530 a2=3 a3=1 items=0 ppid=1 pid=6484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:58.203000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:58.277991 kernel: audit: type=1327 audit(1707505318.203:1661): proctitle=737368643A20636F7265205B707269765D Feb 9 19:01:58.280761 systemd-logind[1370]: New session 26 of user core. Feb 9 19:01:58.281231 systemd[1]: Started session-26.scope. Feb 9 19:01:58.285000 audit[6484]: USER_START pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.313760 kernel: audit: type=1105 audit(1707505318.285:1662): pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.313866 kernel: audit: type=1103 audit(1707505318.312:1663): pid=6486 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.312000 audit[6486]: CRED_ACQ pid=6486 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.624394 sshd[6484]: pam_unix(sshd:session): session closed for user core Feb 9 19:01:58.624000 audit[6484]: USER_END pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.627631 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:01:58.628372 systemd[1]: sshd@23-10.200.20.14:22-10.200.12.6:46674.service: Deactivated successfully. Feb 9 19:01:58.624000 audit[6484]: CRED_DISP pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.675830 kernel: audit: type=1106 audit(1707505318.624:1664): pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.675982 kernel: audit: type=1104 audit(1707505318.624:1665): pid=6484 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:01:58.676050 systemd-logind[1370]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:01:58.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.14:22-10.200.12.6:46674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:01:58.676957 systemd-logind[1370]: Removed session 26. Feb 9 19:02:03.702689 systemd[1]: Started sshd@24-10.200.20.14:22-10.200.12.6:46676.service. Feb 9 19:02:03.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.14:22-10.200.12.6:46676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:03.708567 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:02:03.708671 kernel: audit: type=1130 audit(1707505323.702:1667): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.14:22-10.200.12.6:46676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:04.117000 audit[6508]: USER_ACCT pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.119008 sshd[6508]: Accepted publickey for core from 10.200.12.6 port 46676 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:02:04.143314 kernel: audit: type=1101 audit(1707505324.117:1668): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.142000 audit[6508]: CRED_ACQ pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.144735 sshd[6508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:02:04.182677 kernel: audit: type=1103 audit(1707505324.142:1669): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.182791 kernel: audit: type=1006 audit(1707505324.143:1670): pid=6508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:02:04.143000 audit[6508]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1676a90 a2=3 a3=1 items=0 ppid=1 pid=6508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.183264 kernel: audit: type=1300 audit(1707505324.143:1670): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1676a90 a2=3 a3=1 items=0 ppid=1 pid=6508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:04.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:02:04.218819 kernel: audit: type=1327 audit(1707505324.143:1670): proctitle=737368643A20636F7265205B707269765D Feb 9 19:02:04.220807 systemd-logind[1370]: New session 27 of user core. Feb 9 19:02:04.221230 systemd[1]: Started session-27.scope. Feb 9 19:02:04.224000 audit[6508]: USER_START pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.250000 audit[6510]: CRED_ACQ pid=6510 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.273732 kernel: audit: type=1105 audit(1707505324.224:1671): pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.273900 kernel: audit: type=1103 audit(1707505324.250:1672): pid=6510 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.551445 sshd[6508]: pam_unix(sshd:session): session closed for user core Feb 9 19:02:04.551000 audit[6508]: USER_END pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.554484 systemd-logind[1370]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:02:04.555695 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:02:04.556819 systemd-logind[1370]: Removed session 27. Feb 9 19:02:04.557512 systemd[1]: sshd@24-10.200.20.14:22-10.200.12.6:46676.service: Deactivated successfully. Feb 9 19:02:04.551000 audit[6508]: CRED_DISP pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.601281 kernel: audit: type=1106 audit(1707505324.551:1673): pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.601419 kernel: audit: type=1104 audit(1707505324.551:1674): pid=6508 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:04.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.14:22-10.200.12.6:46676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:07.515000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:07.515000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:07.515000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f48fa0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:07.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:07.515000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011fb110 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:07.515000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:08.245000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.245000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400baedef0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:08.251000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.251000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400af79410 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.251000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:08.253000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.253000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=40108662c0 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.253000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:08.296000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.296000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400af79b60 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:08.296000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.296000 audit[2371]: AVC avc: denied { watch } for pid=2371 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:08.296000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4010866c60 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:08.296000 audit[2371]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=66 a1=400b148240 a2=fc6 a3=0 items=0 ppid=2235 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c924,c955 key=(null) Feb 9 19:02:08.296000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 9 19:02:09.630174 systemd[1]: Started sshd@25-10.200.20.14:22-10.200.12.6:37004.service. Feb 9 19:02:09.639722 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:02:09.639845 kernel: audit: type=1130 audit(1707505329.629:1684): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.14:22-10.200.12.6:37004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:09.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.14:22-10.200.12.6:37004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:10.082000 audit[6522]: USER_ACCT pid=6522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.083966 sshd[6522]: Accepted publickey for core from 10.200.12.6 port 37004 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:02:10.086797 sshd[6522]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:02:10.085000 audit[6522]: CRED_ACQ pid=6522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.133716 kernel: audit: type=1101 audit(1707505330.082:1685): pid=6522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.133844 kernel: audit: type=1103 audit(1707505330.085:1686): pid=6522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.148402 kernel: audit: type=1006 audit(1707505330.085:1687): pid=6522 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 19:02:10.085000 audit[6522]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1864fd0 a2=3 a3=1 items=0 ppid=1 pid=6522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:10.174843 kernel: audit: type=1300 audit(1707505330.085:1687): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1864fd0 a2=3 a3=1 items=0 ppid=1 pid=6522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:10.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:02:10.183768 kernel: audit: type=1327 audit(1707505330.085:1687): proctitle=737368643A20636F7265205B707269765D Feb 9 19:02:10.186486 systemd-logind[1370]: New session 28 of user core. Feb 9 19:02:10.187341 systemd[1]: Started session-28.scope. Feb 9 19:02:10.190000 audit[6522]: USER_START pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.191000 audit[6524]: CRED_ACQ pid=6524 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.242185 kernel: audit: type=1105 audit(1707505330.190:1688): pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.242310 kernel: audit: type=1103 audit(1707505330.191:1689): pid=6524 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.525298 sshd[6522]: pam_unix(sshd:session): session closed for user core Feb 9 19:02:10.525000 audit[6522]: USER_END pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.528720 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:02:10.529770 systemd[1]: sshd@25-10.200.20.14:22-10.200.12.6:37004.service: Deactivated successfully. Feb 9 19:02:10.525000 audit[6522]: CRED_DISP pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.578242 kernel: audit: type=1106 audit(1707505330.525:1690): pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.578436 kernel: audit: type=1104 audit(1707505330.525:1691): pid=6522 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:02:10.578460 systemd-logind[1370]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:02:10.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.14:22-10.200.12.6:37004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:02:10.579973 systemd-logind[1370]: Removed session 28. Feb 9 19:02:16.934900 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.31SNsd.mount: Deactivated successfully. Feb 9 19:02:20.075209 systemd[1]: run-containerd-runc-k8s.io-be752e05d9b5e669c5604687e3048847e817a7b635ee471082d1c853b15b7a2e-runc.HEU715.mount: Deactivated successfully. Feb 9 19:02:23.671000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.676932 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:02:23.677053 kernel: audit: type=1400 audit(1707505343.671:1693): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.671000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d0f060 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.728428 kernel: audit: type=1300 audit(1707505343.671:1693): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d0f060 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.728589 kernel: audit: type=1327 audit(1707505343.671:1693): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.671000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.774646 kernel: audit: type=1400 audit(1707505343.671:1694): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.774752 kernel: audit: type=1300 audit(1707505343.671:1694): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001355fa0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.671000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001355fa0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.828121 kernel: audit: type=1327 audit(1707505343.671:1694): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.828317 kernel: audit: type=1400 audit(1707505343.671:1695): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.671000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.671000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001355fc0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.881994 kernel: audit: type=1300 audit(1707505343.671:1695): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001355fc0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.907014 kernel: audit: type=1327 audit(1707505343.671:1695): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:23.907172 kernel: audit: type=1400 audit(1707505343.671:1696): avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.671000 audit[2432]: AVC avc: denied { watch } for pid=2432 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:23.671000 audit[2432]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40011800e0 a2=fc6 a3=0 items=0 ppid=2297 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:23.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:24.377230 systemd[1]: cri-containerd-c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123.scope: Deactivated successfully. Feb 9 19:02:24.377559 systemd[1]: cri-containerd-c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123.scope: Consumed 7.991s CPU time. Feb 9 19:02:24.376000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:02:24.381000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:02:24.397993 env[1381]: time="2024-02-09T19:02:24.396728465Z" level=info msg="shim disconnected" id=c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123 Feb 9 19:02:24.397993 env[1381]: time="2024-02-09T19:02:24.396787384Z" level=warning msg="cleaning up after shim disconnected" id=c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123 namespace=k8s.io Feb 9 19:02:24.397993 env[1381]: time="2024-02-09T19:02:24.396798984Z" level=info msg="cleaning up dead shim" Feb 9 19:02:24.397462 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123-rootfs.mount: Deactivated successfully. Feb 9 19:02:24.404620 env[1381]: time="2024-02-09T19:02:24.404545828Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:02:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6592 runtime=io.containerd.runc.v2\n" Feb 9 19:02:25.565169 kubelet[2547]: I0209 19:02:25.564593 2547 scope.go:115] "RemoveContainer" containerID="c030007d5cdc54c84f0914f345a91ddc37b5213785de9826a3bcb46521511123" Feb 9 19:02:25.566799 env[1381]: time="2024-02-09T19:02:25.566747823Z" level=info msg="CreateContainer within sandbox \"b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 9 19:02:25.652364 env[1381]: time="2024-02-09T19:02:25.652310718Z" level=info msg="CreateContainer within sandbox \"b5df9d63c88cfdff1448784c4082d444c3efe5f2624c9702e0025cdb941f9127\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"50c5a8c2f1149f667a95ddb73d19ac852d117aa484e13c759e8baf87e12d772c\"" Feb 9 19:02:25.652835 env[1381]: time="2024-02-09T19:02:25.652809268Z" level=info msg="StartContainer for \"50c5a8c2f1149f667a95ddb73d19ac852d117aa484e13c759e8baf87e12d772c\"" Feb 9 19:02:25.676235 systemd[1]: Started cri-containerd-50c5a8c2f1149f667a95ddb73d19ac852d117aa484e13c759e8baf87e12d772c.scope. Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.690000 audit: BPF prog-id=214 op=LOAD Feb 9 19:02:25.691000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.691000 audit[6614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2710 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530633561386332663131343966363637613935646462373364313961 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2710 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530633561386332663131343966363637613935646462373364313961 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.692000 audit: BPF prog-id=215 op=LOAD Feb 9 19:02:25.692000 audit[6614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2710 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530633561386332663131343966363637613935646462373364313961 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit: BPF prog-id=216 op=LOAD Feb 9 19:02:25.693000 audit[6614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2710 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530633561386332663131343966363637613935646462373364313961 Feb 9 19:02:25.693000 audit: BPF prog-id=216 op=UNLOAD Feb 9 19:02:25.693000 audit: BPF prog-id=215 op=UNLOAD Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { perfmon } for pid=6614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit[6614]: AVC avc: denied { bpf } for pid=6614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:25.693000 audit: BPF prog-id=217 op=LOAD Feb 9 19:02:25.693000 audit[6614]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2710 pid=6614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:25.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530633561386332663131343966363637613935646462373364313961 Feb 9 19:02:25.717317 env[1381]: time="2024-02-09T19:02:25.717264984Z" level=info msg="StartContainer for \"50c5a8c2f1149f667a95ddb73d19ac852d117aa484e13c759e8baf87e12d772c\" returns successfully" Feb 9 19:02:25.792062 kubelet[2547]: E0209 19:02:25.791822 2547 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.14:50308->10.200.20.12:2379: read: connection timed out Feb 9 19:02:25.796558 systemd[1]: cri-containerd-d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500.scope: Deactivated successfully. Feb 9 19:02:25.796866 systemd[1]: cri-containerd-d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500.scope: Consumed 1.631s CPU time. Feb 9 19:02:25.801000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:02:25.801000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:02:25.817476 env[1381]: time="2024-02-09T19:02:25.815795821Z" level=info msg="shim disconnected" id=d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500 Feb 9 19:02:25.817476 env[1381]: time="2024-02-09T19:02:25.815843220Z" level=warning msg="cleaning up after shim disconnected" id=d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500 namespace=k8s.io Feb 9 19:02:25.817476 env[1381]: time="2024-02-09T19:02:25.815854180Z" level=info msg="cleaning up dead shim" Feb 9 19:02:25.825305 env[1381]: time="2024-02-09T19:02:25.825217994Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:02:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6655 runtime=io.containerd.runc.v2\n" Feb 9 19:02:26.021668 systemd[1]: cri-containerd-40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750.scope: Deactivated successfully. Feb 9 19:02:26.021973 systemd[1]: cri-containerd-40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750.scope: Consumed 4.080s CPU time. Feb 9 19:02:26.025000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:02:26.025000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:02:26.042710 env[1381]: time="2024-02-09T19:02:26.042666188Z" level=info msg="shim disconnected" id=40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750 Feb 9 19:02:26.042929 env[1381]: time="2024-02-09T19:02:26.042911023Z" level=warning msg="cleaning up after shim disconnected" id=40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750 namespace=k8s.io Feb 9 19:02:26.043064 env[1381]: time="2024-02-09T19:02:26.043049620Z" level=info msg="cleaning up dead shim" Feb 9 19:02:26.050558 env[1381]: time="2024-02-09T19:02:26.050516592Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:02:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6679 runtime=io.containerd.runc.v2\n" Feb 9 19:02:26.568388 kubelet[2547]: I0209 19:02:26.568343 2547 scope.go:115] "RemoveContainer" containerID="40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750" Feb 9 19:02:26.570378 kubelet[2547]: I0209 19:02:26.570354 2547 scope.go:115] "RemoveContainer" containerID="d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500" Feb 9 19:02:26.571617 env[1381]: time="2024-02-09T19:02:26.571580130Z" level=info msg="CreateContainer within sandbox \"9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 9 19:02:26.573091 env[1381]: time="2024-02-09T19:02:26.573061221Z" level=info msg="CreateContainer within sandbox \"f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 9 19:02:26.624612 systemd[1]: run-containerd-runc-k8s.io-50c5a8c2f1149f667a95ddb73d19ac852d117aa484e13c759e8baf87e12d772c-runc.opCVd3.mount: Deactivated successfully. Feb 9 19:02:26.624723 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-40656b22ebf2f3a1a05a1700ef156de140a1b8434061de2e811cd282b9c09750-rootfs.mount: Deactivated successfully. Feb 9 19:02:26.624775 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d2bc5d62c0d24073bb4c92d240e5b073c998742da65ff18c471a5b5f65173500-rootfs.mount: Deactivated successfully. Feb 9 19:02:26.654770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2055194832.mount: Deactivated successfully. Feb 9 19:02:26.720580 env[1381]: time="2024-02-09T19:02:26.720530945Z" level=info msg="CreateContainer within sandbox \"9e9673d447af4f4331ab6ff1f1adacac89056090b6985ca968be1dd34dd50b28\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"eb80cd434a63aad6145eaa6a6f6837627bb59b7ee8779be3d3d950d5ed38f72d\"" Feb 9 19:02:26.721287 env[1381]: time="2024-02-09T19:02:26.721232051Z" level=info msg="StartContainer for \"eb80cd434a63aad6145eaa6a6f6837627bb59b7ee8779be3d3d950d5ed38f72d\"" Feb 9 19:02:26.733558 env[1381]: time="2024-02-09T19:02:26.733501528Z" level=info msg="CreateContainer within sandbox \"f33abe8707ffbdf2139f813209cc077d19760606b02893ecca87231a1892e2bd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ef8bc6e8ade4b8701b7cb8f6b162603698f600570893f693c367a30be5ec334f\"" Feb 9 19:02:26.734155 env[1381]: time="2024-02-09T19:02:26.734130196Z" level=info msg="StartContainer for \"ef8bc6e8ade4b8701b7cb8f6b162603698f600570893f693c367a30be5ec334f\"" Feb 9 19:02:26.745050 systemd[1]: Started cri-containerd-eb80cd434a63aad6145eaa6a6f6837627bb59b7ee8779be3d3d950d5ed38f72d.scope. Feb 9 19:02:26.763096 systemd[1]: Started cri-containerd-ef8bc6e8ade4b8701b7cb8f6b162603698f600570893f693c367a30be5ec334f.scope. Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.766000 audit: BPF prog-id=218 op=LOAD Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2297 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383063643433346136336161643631343565616136613666363833 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2297 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383063643433346136336161643631343565616136613666363833 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.767000 audit: BPF prog-id=219 op=LOAD Feb 9 19:02:26.767000 audit[6738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2297 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383063643433346136336161643631343565616136613666363833 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit: BPF prog-id=220 op=LOAD Feb 9 19:02:26.768000 audit[6738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2297 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383063643433346136336161643631343565616136613666363833 Feb 9 19:02:26.768000 audit: BPF prog-id=220 op=UNLOAD Feb 9 19:02:26.768000 audit: BPF prog-id=219 op=UNLOAD Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { perfmon } for pid=6738 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit[6738]: AVC avc: denied { bpf } for pid=6738 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.768000 audit: BPF prog-id=221 op=LOAD Feb 9 19:02:26.768000 audit[6738]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2297 pid=6738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562383063643433346136336161643631343565616136613666363833 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.781000 audit: BPF prog-id=222 op=LOAD Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2271 pid=6754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386263366538616465346238373031623763623866366231363236 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2271 pid=6754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386263366538616465346238373031623763623866366231363236 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.782000 audit: BPF prog-id=223 op=LOAD Feb 9 19:02:26.782000 audit[6754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2271 pid=6754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386263366538616465346238373031623763623866366231363236 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit: BPF prog-id=224 op=LOAD Feb 9 19:02:26.783000 audit[6754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2271 pid=6754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386263366538616465346238373031623763623866366231363236 Feb 9 19:02:26.783000 audit: BPF prog-id=224 op=UNLOAD Feb 9 19:02:26.783000 audit: BPF prog-id=223 op=UNLOAD Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { perfmon } for pid=6754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit[6754]: AVC avc: denied { bpf } for pid=6754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:26.783000 audit: BPF prog-id=225 op=LOAD Feb 9 19:02:26.783000 audit[6754]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2271 pid=6754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:26.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386263366538616465346238373031623763623866366231363236 Feb 9 19:02:26.820677 env[1381]: time="2024-02-09T19:02:26.820580767Z" level=info msg="StartContainer for \"eb80cd434a63aad6145eaa6a6f6837627bb59b7ee8779be3d3d950d5ed38f72d\" returns successfully" Feb 9 19:02:26.835497 env[1381]: time="2024-02-09T19:02:26.835439953Z" level=info msg="StartContainer for \"ef8bc6e8ade4b8701b7cb8f6b162603698f600570893f693c367a30be5ec334f\" returns successfully" Feb 9 19:02:28.260000 audit[6762]: AVC avc: denied { watch } for pid=6762 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:28.260000 audit[6762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400013c630 a2=fc6 a3=0 items=0 ppid=2297 pid=6762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:28.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:28.261000 audit[6762]: AVC avc: denied { watch } for pid=6762 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:02:28.261000 audit[6762]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ea0040 a2=fc6 a3=0 items=0 ppid=2297 pid=6762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c596 key=(null) Feb 9 19:02:28.261000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:02:28.733406 kubelet[2547]: E0209 19:02:28.733268 2547 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-71d57399a1.17b2470ef3c070ec", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-71d57399a1", UID:"d43e386a31bdd5995ce9402882d38106", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-71d57399a1"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 2, 18, 271428844, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 2, 18, 271428844, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.14:50116->10.200.20.12:2379: read: connection timed out' (will not retry!) Feb 9 19:02:31.690000 audit[5550]: AVC avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 19:02:31.696137 kernel: kauditd_printk_skb: 185 callbacks suppressed Feb 9 19:02:31.696212 kernel: audit: type=1400 audit(1707505351.690:1759): avc: denied { watch } for pid=5550 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.4230756615/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c651,c816 tclass=file permissive=0 Feb 9 19:02:31.690000 audit[5550]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e56ea0 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 19:02:31.749468 kernel: audit: type=1300 audit(1707505351.690:1759): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e56ea0 a2=fc6 a3=0 items=0 ppid=5458 pid=5550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c651,c816 key=(null) Feb 9 19:02:31.690000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:02:31.774371 kernel: audit: type=1327 audit(1707505351.690:1759): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:02:32.169000 audit[5512]: AVC avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 19:02:32.169000 audit[5512]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000da6940 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 19:02:32.221428 kernel: audit: type=1400 audit(1707505352.169:1760): avc: denied { watch } for pid=5512 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_18_59_26.3556280868/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c158,c413 tclass=file permissive=0 Feb 9 19:02:32.221545 kernel: audit: type=1300 audit(1707505352.169:1760): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000da6940 a2=fc6 a3=0 items=0 ppid=5403 pid=5512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c158,c413 key=(null) Feb 9 19:02:32.221577 kernel: audit: type=1327 audit(1707505352.169:1760): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:02:32.169000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:02:35.562811 systemd[1]: run-containerd-runc-k8s.io-d3eec8c62c56b837a0dbc26c18d3fb5aba2150993457d3acff6a530606a348f4-runc.i8ovPS.mount: Deactivated successfully. Feb 9 19:02:35.792792 kubelet[2547]: E0209 19:02:35.792536 2547 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:45.793284 kubelet[2547]: E0209 19:02:45.793225 2547 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:55.794208 kubelet[2547]: E0209 19:02:55.794099 2547 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-71d57399a1?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:56.305717 systemd[1]: run-containerd-runc-k8s.io-fc86549d944b6cf89cb0209ea2695aab2ee76475d7a66135bd6326ecc065a855-runc.NSMBXT.mount: Deactivated successfully. Feb 9 19:02:56.323582 systemd[1]: run-containerd-runc-k8s.io-b994339422975bea721beee79336d3d78fe6c3eb9932bed45041d5d363594e9f-runc.PCB6V4.mount: Deactivated successfully. Feb 9 19:02:56.722305 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.722658 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.748814 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.749094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.777104 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.777416 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.802256 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.802532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.826742 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.827030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.852361 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.852596 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.870969 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.871225 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.888422 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.888707 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.905923 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.906182 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.924199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.924501 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.941925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.942195 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.958565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.958848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.975774 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#192 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:02:56.976054 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#193 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001